Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-8897 (GCVE-0-2018-8897)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:10:46.698Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "name": "1040849", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040849" }, { "name": "104071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104071" }, { "name": "RHSA-2018:1350", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX234679" }, { "name": "RHSA-2018:1347", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "44697", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44697/" }, { "name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "name": "1040866", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040866" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/HT208742" }, { "name": "RHSA-2018:1346", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "name": "RHSA-2018:1348", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "RHSA-2018:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "name": "DSA-4196", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "name": "1040744", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040744" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "name": "RHSA-2018:1351", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "name": "RHSA-2018:1319", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "DSA-4201", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "RHSA-2018:1355", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "name": "RHSA-2018:1345", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "45024", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45024/" }, { "name": "RHSA-2018:1349", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "name": "RHSA-2018:1352", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "name": "RHSA-2018:1318", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://patchwork.kernel.org/patch/10386677/" }, { "name": "VU#631579", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/631579" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/can1357/CVE-2018-8897/" }, { "name": "RHSA-2018:1524", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "name": "1040861", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040861" }, { "name": "RHSA-2018:1353", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "name": "USN-3641-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "name": "1040882", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040882" }, { "name": "USN-3641-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-21T08:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "name": "1040849", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040849" }, { "name": "104071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104071" }, { "name": "RHSA-2018:1350", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX234679" }, { "name": "RHSA-2018:1347", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "44697", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44697/" }, { "name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "name": "1040866", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040866" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/HT208742" }, { "name": "RHSA-2018:1346", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "name": "RHSA-2018:1348", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "RHSA-2018:1354", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "tags": [ "x_refsource_MISC" ], "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "name": "DSA-4196", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "name": "1040744", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040744" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "name": "RHSA-2018:1351", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "tags": [ "x_refsource_MISC" ], "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "name": "RHSA-2018:1319", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "DSA-4201", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "RHSA-2018:1355", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "name": "RHSA-2018:1345", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "45024", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45024/" }, { "name": "RHSA-2018:1349", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "name": "RHSA-2018:1352", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "name": "RHSA-2018:1318", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "tags": [ "x_refsource_MISC" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://patchwork.kernel.org/patch/10386677/" }, { "name": "VU#631579", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/631579" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/can1357/CVE-2018-8897/" }, { "name": "RHSA-2018:1524", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "name": "1040861", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040861" }, { "name": "RHSA-2018:1353", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "name": "USN-3641-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "name": "1040882", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040882" }, { "name": "USN-3641-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "name": "http://openwall.com/lists/oss-security/2018/05/08/4", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "name": "1040849", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040849" }, { "name": "104071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104071" }, { "name": "RHSA-2018:1350", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "name": "https://support.citrix.com/article/CTX234679", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX234679" }, { "name": "RHSA-2018:1347", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "44697", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44697/" }, { "name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "name": "1040866", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040866" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "name": "https://support.apple.com/HT208742", "refsource": "MISC", "url": "https://support.apple.com/HT208742" }, { "name": "RHSA-2018:1346", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "name": "RHSA-2018:1348", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "RHSA-2018:1354", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "name": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368", "refsource": "MISC", "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "name": "DSA-4196", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc", "refsource": "MISC", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "name": "1040744", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040744" }, { "name": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html", "refsource": "MISC", "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "name": "RHSA-2018:1351", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "name": "https://xenbits.xen.org/xsa/advisory-260.html", "refsource": "MISC", "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "name": "RHSA-2018:1319", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "DSA-4201", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4201" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "RHSA-2018:1355", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "https://security.netapp.com/advisory/ntap-20180927-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "name": "RHSA-2018:1345", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "45024", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45024/" }, { "name": "RHSA-2018:1349", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "name": "RHSA-2018:1352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "name": "RHSA-2018:1318", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "name": "https://patchwork.kernel.org/patch/10386677/", "refsource": "MISC", "url": "https://patchwork.kernel.org/patch/10386677/" }, { "name": "VU#631579", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/631579" }, { "name": "https://github.com/can1357/CVE-2018-8897/", "refsource": "MISC", "url": "https://github.com/can1357/CVE-2018-8897/" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "http://openwall.com/lists/oss-security/2018/05/08/1", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "name": "1040861", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040861" }, { "name": "RHSA-2018:1353", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "name": "USN-3641-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_21", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "name": "1040882", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040882" }, { "name": "USN-3641-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-1/" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-8897", "datePublished": "2018-05-08T18:00:00", "dateReserved": "2018-03-21T00:00:00", "dateUpdated": "2024-08-05T07:10:46.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-8897\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-05-08T18:29:00.547\",\"lastModified\":\"2024-11-21T04:14:33.140\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.\"},{\"lang\":\"es\",\"value\":\"Una declaraci\u00f3n en la gu\u00eda de programaci\u00f3n de sistemas del Manual del desarrollador de software (SDM) de las arquitecturas Intel 64 e IA-32 se manej\u00f3 incorrectamente en el desarrollo de algunos o todos los n\u00facleos del sistema operativo, lo que provoc\u00f3 un comportamiento inesperado para las excepciones #DB que son diferidas por MOV SS o POP SS, tal y como queda demostrado con (por ejemplo) el escalado de privilegios en Windows, macOS, algunas configuraciones Xen o FreeBSD, o un fallo del kernel de Linux. Las instrucciones de MOV a SS y POP SS inhiben interrupciones (incluyendo NMI), puntos de interrupci\u00f3n de datos y excepciones de trampas de un paso hasta los l\u00edmites de la instrucci\u00f3n que siguen a la siguiente instrucci\u00f3n (SDM Vol. 3A; secci\u00f3n 6.8.3). (Los puntos de interrupci\u00f3n de datos inhibidos son aquellos en la memoria a los que accede a la propia instrucci\u00f3n MOV a SS o POP a SS). Tenga en cuenta que las excepciones de depuraci\u00f3n no est\u00e1n inhibidas por el indicador del sistema de habilitaci\u00f3n de interrupciones (EFLAGS.IF) (SDM Vol. 3A; secci\u00f3n 2.3). Si la instrucci\u00f3n que sigue a la instrucci\u00f3n MOV a SS o POP a SS es una instrucci\u00f3n como SYSCALL, SYSENTER, INT 3, etc. que transfiere el control al sistema operativo a CPL \u003c 3, la excepci\u00f3n de depuraci\u00f3n se entrega despu\u00e9s de que la transferencia a CPL \u003c 3 se haya completado. Es posible que los kernels del sistema operativo no esperen este orden de eventos y, por lo tanto, puedan experimentar un comportamiento inesperado cuando ocurra.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46DFC288-53F5-4D8E-BD2F-4E828735F915\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FCF191B-971A-4945-AB14-08091689BE2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCEA97B9-A443-4F87-81B4-B3F0E94AC18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56434D13-7A7B-495C-A135-2688C706A065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"405F950F-0772-41A3-8B72-B67151CC1376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5647AEA-DCE6-4950-A7EB-05465ECDDE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A35129-70B0-4EA9-A0A2-51AC277649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55FD399E-959A-4FB6-B049-AA73F0DFF9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49422CA5-DF4B-4FE4-B408-81B637BE1287\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C997777-BE79-4F77-90D7-E1A71D474D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01527614-8A68-48DC-B0A0-F4AA99489221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65372FA7-B54B-4298-99BF-483E9FEBA253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D04EA1A-F8E0-415B-8786-1C8C0F08E132\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.13.4\",\"matchCriteriaId\":\"D053772A-D0AE-474A-AE49-26A251C4B5D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*\",\"matchCriteriaId\":\"BAB3DD44-8D3F-493C-936C-E0D6C63685C4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndExcluding\":\"11.1\",\"matchCriteriaId\":\"702C5136-33B6-4F0F-8FF7-C2BE3668DE70\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://openwall.com/lists/oss-security/2018/05/08/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://openwall.com/lists/oss-security/2018/05/08/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/104071\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040744\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040849\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040861\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040866\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040882\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1318\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1319\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1345\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1346\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1347\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1348\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1349\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1350\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1351\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1352\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1353\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1354\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1355\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1524\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1567074\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/can1357/CVE-2018-8897/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://patchwork.kernel.org/patch/10386677/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180927-0002/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.apple.com/HT208742\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX234679\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://svnweb.freebsd.org/base?view=revision\u0026revision=333368\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3641-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3641-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4196\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4201\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44697/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/45024/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/631579\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_21\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://xenbits.xen.org/xsa/advisory-260.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://openwall.com/lists/oss-security/2018/05/08/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://openwall.com/lists/oss-security/2018/05/08/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/104071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040744\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040849\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040861\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040866\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040882\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1318\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1319\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1346\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1350\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1354\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1355\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1567074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/can1357/CVE-2018-8897/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://patchwork.kernel.org/patch/10386677/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180927-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT208742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX234679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://svnweb.freebsd.org/base?view=revision\u0026revision=333368\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3641-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3641-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44697/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/45024/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/631579\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://xenbits.xen.org/xsa/advisory-260.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
suse-su-2018:1184-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen to version 4.9.2 fixes several issues.\n\nThis feature was added:\n\n- Added script, udev rule and systemd service to watch for vcpu online/offline\n events in a HVM domU. They are triggered via \u0027xl vcpu-set domU N\u0027\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n- CVE-2018-7540: x86 PV guest OS users were able to cause a denial of service\n (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing (bsc#1080635).\n- CVE-2018-7541: Guest OS users were able to cause a denial of service\n (hypervisor crash) or gain privileges by triggering a grant-table transition\n from v2 to v1 (bsc#1080662).\n- CVE-2018-7542: x86 PVH guest OS users were able to cause a denial of service\n (NULL pointer dereference and hypervisor crash) by leveraging the mishandling\n of configurations that lack a Local APIC (bsc#1080634).\n\nThese non-security issues were fixed:\n\n- bsc#1087252: Update built-in defaults for xenstored in stubdom, keep default\n to run xenstored as daemon in dom0\n- bsc#1087251: Preserve xen-syms from xen-dbg.gz to allow processing vmcores\n with crash(1) \n- bsc#1072834: Prevent unchecked MSR access error\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-828,SUSE-SLE-SDK-12-SP3-2018-828,SUSE-SLE-SERVER-12-SP3-2018-828", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1184-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1184-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181184-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1184-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1072834", "url": "https://bugzilla.suse.com/1072834" }, { "category": "self", "summary": "SUSE Bug 1080634", "url": "https://bugzilla.suse.com/1080634" }, { "category": "self", "summary": "SUSE Bug 1080635", "url": "https://bugzilla.suse.com/1080635" }, { "category": "self", "summary": "SUSE Bug 1080662", "url": "https://bugzilla.suse.com/1080662" }, { "category": "self", "summary": "SUSE Bug 1087251", "url": "https://bugzilla.suse.com/1087251" }, { "category": "self", "summary": "SUSE Bug 1087252", "url": "https://bugzilla.suse.com/1087252" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7540 page", "url": "https://www.suse.com/security/cve/CVE-2018-7540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7541 page", "url": "https://www.suse.com/security/cve/CVE-2018-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7542 page", "url": "https://www.suse.com/security/cve/CVE-2018-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-05-09T15:05:50Z", "generator": { "date": "2018-05-09T15:05:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1184-1", "initial_release_date": "2018-05-09T15:05:50Z", "revision_history": [ { "date": "2018-05-09T15:05:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.9.2_04-3.29.1.aarch64", "product": { "name": "xen-devel-4.9.2_04-3.29.1.aarch64", "product_id": "xen-devel-4.9.2_04-3.29.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-4.9.2_04-3.29.1.x86_64", "product_id": "xen-4.9.2_04-3.29.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-libs-4.9.2_04-3.29.1.x86_64", "product_id": "xen-libs-4.9.2_04-3.29.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "product_id": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-devel-4.9.2_04-3.29.1.x86_64", "product_id": "xen-devel-4.9.2_04-3.29.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-doc-html-4.9.2_04-3.29.1.x86_64", "product_id": "xen-doc-html-4.9.2_04-3.29.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-tools-4.9.2_04-3.29.1.x86_64", "product_id": "xen-tools-4.9.2_04-3.29.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.9.2_04-3.29.1.x86_64", "product": { "name": "xen-tools-domU-4.9.2_04-3.29.1.x86_64", "product_id": "xen-tools-domU-4.9.2_04-3.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-libs-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.9.2_04-3.29.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64" }, "product_reference": "xen-devel-4.9.2_04-3.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-devel-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-doc-html-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-libs-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-tools-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-doc-html-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-libs-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-tools-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.9.2_04-3.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64" }, "product_reference": "xen-tools-domU-4.9.2_04-3.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T15:05:50Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T15:05:50Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-7540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7540" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7540", "url": "https://www.suse.com/security/cve/CVE-2018-7540" }, { "category": "external", "summary": "SUSE Bug 1080635 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1080635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T15:05:50Z", "details": "moderate" } ], "title": "CVE-2018-7540" }, { "cve": "CVE-2018-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7541" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7541", "url": "https://www.suse.com/security/cve/CVE-2018-7541" }, { "category": "external", "summary": "SUSE Bug 1080662 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1080662" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T15:05:50Z", "details": "important" } ], "title": "CVE-2018-7541" }, { "cve": "CVE-2018-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7542" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7542", "url": "https://www.suse.com/security/cve/CVE-2018-7542" }, { "category": "external", "summary": "SUSE Bug 1080634 for CVE-2018-7542", "url": "https://bugzilla.suse.com/1080634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T15:05:50Z", "details": "important" } ], "title": "CVE-2018-7542" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_04-3.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_04-3.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T15:05:50Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1510-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_56 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1062,SUSE-SLE-SERVER-12-SP2-2018-1062", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1510-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1510-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1510-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:31Z", "generator": { "date": "2018-06-05T14:48:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1510-1", "initial_release_date": "2018-06-05T14:48:31Z", "revision_history": [ { "date": "2018-06-05T14:48:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_56-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:31Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1202-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n- CVE-2018-7550: The load_multiboot function allowed local guest OS users to\n execute arbitrary code on the host via a mh_load_end_addr value greater than\n mh_bss_end_addr, which triggers an out-of-bounds read or write memory access\n (bsc#1083292).\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2018-839,SUSE-SLE-SAP-12-SP1-2018-839,SUSE-SLE-SERVER-12-SP1-2018-839", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1202-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1202-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181202-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1202-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1083292", "url": "https://bugzilla.suse.com/1083292" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7550 page", "url": "https://www.suse.com/security/cve/CVE-2018-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-05-10T10:43:03Z", "generator": { "date": "2018-05-10T10:43:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1202-1", "initial_release_date": "2018-05-10T10:43:03Z", "revision_history": [ { "date": "2018-05-10T10:43:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.5.5_24-22.46.1.x86_64", "product": { "name": "xen-4.5.5_24-22.46.1.x86_64", "product_id": "xen-4.5.5_24-22.46.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.5.5_24-22.46.1.x86_64", "product": { "name": "xen-doc-html-4.5.5_24-22.46.1.x86_64", "product_id": "xen-doc-html-4.5.5_24-22.46.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "product": { "name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "product_id": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.5.5_24-22.46.1.x86_64", "product": { "name": "xen-libs-4.5.5_24-22.46.1.x86_64", "product_id": "xen-libs-4.5.5_24-22.46.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "product": { "name": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "product_id": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.5.5_24-22.46.1.x86_64", "product": { "name": "xen-tools-4.5.5_24-22.46.1.x86_64", "product_id": "xen-tools-4.5.5_24-22.46.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.5.5_24-22.46.1.x86_64", "product": { "name": "xen-tools-domU-4.5.5_24-22.46.1.x86_64", "product_id": "xen-tools-domU-4.5.5_24-22.46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.5_24-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.5_24-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-doc-html-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64" }, "product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.5_24-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-libs-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.5_24-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-tools-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.5_24-22.46.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-tools-domU-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-doc-html-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64" }, "product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-libs-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-tools-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-tools-domU-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-doc-html-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64" }, "product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-libs-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-tools-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.5.5_24-22.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64" }, "product_reference": "xen-tools-domU-4.5.5_24-22.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T10:43:03Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T10:43:03Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7550" } ], "notes": [ { "category": "general", "text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7550", "url": "https://www.suse.com/security/cve/CVE-2018-7550" }, { "category": "external", "summary": "SUSE Bug 1083291 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083291" }, { "category": "external", "summary": "SUSE Bug 1083292 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T10:43:03Z", "details": "important" } ], "title": "CVE-2018-7550" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_24_k3.12.74_60.64.85-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_24-22.46.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_24-22.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T10:43:03Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1543-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 31 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_119 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1035", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1543-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1543-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181543-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1543-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 31 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T13:41:26Z", "generator": { "date": "2018-06-05T13:41:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1543-1", "initial_release_date": "2018-06-05T13:41:26Z", "revision_history": [ { "date": "2018-06-05T13:41:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:26Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:26Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_119-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:26Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1506-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_45 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1054,SUSE-SLE-SERVER-12-SP1-2018-1054", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1506-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1506-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181506-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1506-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:29Z", "generator": { "date": "2018-06-05T14:47:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1506-1", "initial_release_date": "2018-06-05T14:47:29Z", "revision_history": [ { "date": "2018-06-05T14:47:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:29Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:29Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_45-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:29Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1521-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_40 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1056,SUSE-SLE-SERVER-12-SP1-2018-1056", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1521-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1521-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181521-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1521-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:44Z", "generator": { "date": "2018-06-05T14:47:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1521-1", "initial_release_date": "2018-06-05T14:47:44Z", "revision_history": [ { "date": "2018-06-05T14:47:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:44Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:44Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_40-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:44Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1517-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_80 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1044", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1517-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1517-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181517-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1517-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:46:11Z", "generator": { "date": "2018-06-05T14:46:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1517-1", "initial_release_date": "2018-06-05T14:46:11Z", "revision_history": [ { "date": "2018-06-05T14:46:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:11Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:11Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:11Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1509-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_69 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1049,SUSE-SLE-SERVER-12-SP1-2018-1049", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1509-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1509-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181509-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1509-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:46:48Z", "generator": { "date": "2018-06-05T14:46:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1509-1", "initial_release_date": "2018-06-05T14:46:48Z", "revision_history": [ { "date": "2018-06-05T14:46:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:48Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:48Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_69-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:48Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1642-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_6 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1103", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1642-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1642-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1642-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:36:49Z", "generator": { "date": "2018-06-11T08:36:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1642-1", "initial_release_date": "2018-06-11T08:36:49Z", "revision_history": [ { "date": "2018-06-11T08:36:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_6-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:49Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1518-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-92_53 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1063,SUSE-SLE-SERVER-12-SP2-2018-1063", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1518-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1518-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1518-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:40Z", "generator": { "date": "2018-06-05T14:48:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1518-1", "initial_release_date": "2018-06-05T14:48:40Z", "revision_history": [ { "date": "2018-06-05T14:48:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_103-92_53-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:40Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1537-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_66 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1050,SUSE-SLE-SERVER-12-SP1-2018-1050", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1537-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1537-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181537-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1537-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 23 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:46:56Z", "generator": { "date": "2018-06-05T14:46:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1537-1", "initial_release_date": "2018-06-05T14:46:56Z", "revision_history": [ { "date": "2018-06-05T14:46:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:56Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:56Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_66-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:56Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1514-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_48 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1055,SUSE-SLE-SERVER-12-SP1-2018-1055", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1514-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1514-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181514-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1514-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:36Z", "generator": { "date": "2018-06-05T14:47:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1514-1", "initial_release_date": "2018-06-05T14:47:36Z", "revision_history": [ { "date": "2018-06-05T14:47:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:36Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:36Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_48-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:36Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1513-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_85 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1047,SUSE-SLE-SERVER-12-SP1-2018-1047", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1513-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1513-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181513-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1513-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:46:32Z", "generator": { "date": "2018-06-05T14:46:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1513-1", "initial_release_date": "2018-06-05T14:46:32Z", "revision_history": [ { "date": "2018-06-05T14:46:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:32Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_85-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:32Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1639-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_14 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1108", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1639-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1639-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1639-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:39:26Z", "generator": { "date": "2018-06-11T08:39:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1639-1", "initial_release_date": "2018-06-11T08:39:26Z", "revision_history": [ { "date": "2018-06-11T08:39:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:26Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1541-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_57 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1053,SUSE-SLE-SERVER-12-SP1-2018-1053", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1541-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1541-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181541-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1541-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:21Z", "generator": { "date": "2018-06-05T14:47:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1541-1", "initial_release_date": "2018-06-05T14:47:21Z", "revision_history": [ { "date": "2018-06-05T14:47:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:21Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:21Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_57-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:21Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1172-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).\n- CVE-2018-7566: A Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user was fixed (bnc#1083483).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver. (bnc#1072865).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n- CVE-2017-16911: The vhci_hcd driver allowed allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP (bnc#1078674).\n- CVE-2017-18208: The madvise_willneed function in mm/madvise.c allowed local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping (bnc#1083494).\n- CVE-2017-16644: The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c allowed local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1067118).\n- CVE-2018-6927: The futex_requeue function in kernel/futex.c might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value (bnc#1080757).\n- CVE-2017-16914: The \u0027stub_send_ret_submit()\u0027 function (drivers/usb/usbip/stub_tx.c) allowed attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet (bnc#1078669).\n- CVE-2016-7915: The hid_input_field function in drivers/hid/hid-core.c allowed physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver (bnc#1010470).\n- CVE-2015-5156: The virtnet_probe function in drivers/net/virtio_net.c attempted to support a FRAGLIST feature without proper memory allocation, which allowed guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets (bnc#940776).\n- CVE-2017-12190: The bio_map_user_iov and bio_unmap_user functions in block/bio.c did unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition (bnc#1062568).\n- CVE-2017-16912: The \u0027get_pipe()\u0027 function (drivers/usb/usbip/stub_rx.c) allowed attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet (bnc#1078673).\n- CVE-2017-16913: The \u0027stub_recv_cmd_submit()\u0027 function (drivers/usb/usbip/stub_rx.c) when handling CMD_SUBMIT packets allowed attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet (bnc#1078672).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- KABI: x86/kaiser: properly align trampoline stack.\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- ipc/msg: introduce msgctl(MSG_STAT_ANY) (bsc#1072689).\n- ipc/sem: introduce semctl(SEM_STAT_ANY) (bsc#1072689).\n- ipc/shm: introduce shmctl(SHM_STAT_ANY) (bsc#1072689).\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- leds: do not overflow sysfs buffer in led_trigger_show (bsc#1080464).\n- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348).\n- x86-64: Move the \u0027user\u0027 vsyscall segment out of the data segment (bsc#1082424).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n- xfs: check for buffer errors before waiting (bsc#1052943).\n- xfs: fix allocbt cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n- xfs: really fix the cursor leak in xfs_alloc_ag_vextent_near (bsc#1087762).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-source-20180429-13591,slessp3-kernel-source-20180429-13591,slexsp3-kernel-source-20180429-13591", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1172-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1172-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1172-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" }, { "category": "self", "summary": "SUSE Bug 1010470", "url": "https://bugzilla.suse.com/1010470" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1052943", "url": "https://bugzilla.suse.com/1052943" }, { "category": "self", "summary": "SUSE Bug 1062568", "url": "https://bugzilla.suse.com/1062568" }, { "category": "self", "summary": "SUSE Bug 1062840", "url": "https://bugzilla.suse.com/1062840" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1067118", "url": "https://bugzilla.suse.com/1067118" }, { "category": "self", "summary": "SUSE Bug 1072689", "url": "https://bugzilla.suse.com/1072689" }, { "category": "self", "summary": "SUSE Bug 1072865", "url": "https://bugzilla.suse.com/1072865" }, { "category": "self", "summary": "SUSE Bug 1078669", "url": "https://bugzilla.suse.com/1078669" }, { "category": "self", "summary": "SUSE Bug 1078672", "url": "https://bugzilla.suse.com/1078672" }, { "category": "self", "summary": "SUSE Bug 1078673", "url": "https://bugzilla.suse.com/1078673" }, { "category": "self", "summary": "SUSE Bug 1078674", "url": "https://bugzilla.suse.com/1078674" }, { "category": "self", "summary": "SUSE Bug 1080464", "url": "https://bugzilla.suse.com/1080464" }, { "category": "self", "summary": "SUSE Bug 1080757", "url": "https://bugzilla.suse.com/1080757" }, { "category": "self", "summary": "SUSE Bug 1082424", "url": "https://bugzilla.suse.com/1082424" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083483", "url": "https://bugzilla.suse.com/1083483" }, { "category": "self", "summary": "SUSE Bug 1083494", "url": "https://bugzilla.suse.com/1083494" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087209", "url": "https://bugzilla.suse.com/1087209" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087762", "url": "https://bugzilla.suse.com/1087762" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 940776", "url": "https://bugzilla.suse.com/940776" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5156 page", "url": "https://www.suse.com/security/cve/CVE-2015-5156/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7915 page", "url": "https://www.suse.com/security/cve/CVE-2016-7915/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12190 page", "url": "https://www.suse.com/security/cve/CVE-2017-12190/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16644 page", "url": "https://www.suse.com/security/cve/CVE-2017-16644/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16911 page", "url": "https://www.suse.com/security/cve/CVE-2017-16911/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16912 page", "url": "https://www.suse.com/security/cve/CVE-2017-16912/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16913 page", "url": "https://www.suse.com/security/cve/CVE-2017-16913/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16914 page", "url": "https://www.suse.com/security/cve/CVE-2017-16914/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18208 page", "url": "https://www.suse.com/security/cve/CVE-2017-18208/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6927 page", "url": "https://www.suse.com/security/cve/CVE-2018-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7566 page", "url": "https://www.suse.com/security/cve/CVE-2018-7566/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:33:21Z", "generator": { "date": "2018-05-08T17:33:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1172-1", "initial_release_date": "2018-05-08T17:33:21Z", "revision_history": [ { "date": "2018-05-08T17:33:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.22.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5156", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5156" } ], "notes": [ { "category": "general", "text": "The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5156", "url": "https://www.suse.com/security/cve/CVE-2015-5156" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2015-5156", "url": "https://bugzilla.suse.com/1123903" }, { "category": "external", "summary": "SUSE Bug 940776 for CVE-2015-5156", "url": "https://bugzilla.suse.com/940776" }, { "category": "external", "summary": "SUSE Bug 945048 for CVE-2015-5156", "url": "https://bugzilla.suse.com/945048" }, { "category": "external", "summary": "SUSE Bug 951638 for CVE-2015-5156", "url": "https://bugzilla.suse.com/951638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2015-5156" }, { "cve": "CVE-2016-7915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7915" } ], "notes": [ { "category": "general", "text": "The hid_input_field function in drivers/hid/hid-core.c in the Linux kernel before 4.6 allows physically proximate attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) by connecting a device, as demonstrated by a Logitech DJ receiver.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7915", "url": "https://www.suse.com/security/cve/CVE-2016-7915" }, { "category": "external", "summary": "SUSE Bug 1010470 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1010470" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2016-7915", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2016-7915" }, { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-12190", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12190" } ], "notes": [ { "category": "general", "text": "The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory leak and possible system lockup (exploitable against the host OS by a guest OS user, if a SCSI disk is passed through to a virtual machine) due to an out-of-memory condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12190", "url": "https://www.suse.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "SUSE Bug 1062568 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1062568" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-12190", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-12190" }, { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2017-16644", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16644" } ], "notes": [ { "category": "general", "text": "The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16644", "url": "https://www.suse.com/security/cve/CVE-2017-16644" }, { "category": "external", "summary": "SUSE Bug 1067118 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1067118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16644", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16644" }, { "cve": "CVE-2017-16911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16911" } ], "notes": [ { "category": "general", "text": "The vhci_hcd driver in the Linux Kernel before version 4.14.8 and 4.4.114 allows allows local attackers to disclose kernel memory addresses. Successful exploitation requires that a USB device is attached over IP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16911", "url": "https://www.suse.com/security/cve/CVE-2017-16911" }, { "category": "external", "summary": "SUSE Bug 1078674 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1078674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16911", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16912" } ], "notes": [ { "category": "general", "text": "The \"get_pipe()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16912", "url": "https://www.suse.com/security/cve/CVE-2017-16912" }, { "category": "external", "summary": "SUSE Bug 1078673 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1078673" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16912", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16913" } ], "notes": [ { "category": "general", "text": "The \"stub_recv_cmd_submit()\" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16913", "url": "https://www.suse.com/security/cve/CVE-2017-16913" }, { "category": "external", "summary": "SUSE Bug 1078672 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1078672" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16913", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16914" } ], "notes": [ { "category": "general", "text": "The \"stub_send_ret_submit()\" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16914", "url": "https://www.suse.com/security/cve/CVE-2017-16914" }, { "category": "external", "summary": "SUSE Bug 1078669 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1078669" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-16914", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2017-16914" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18208" } ], "notes": [ { "category": "general", "text": "The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18208", "url": "https://www.suse.com/security/cve/CVE-2017-18208" }, { "category": "external", "summary": "SUSE Bug 1083494 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1083494" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18208", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2017-18208" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6927" } ], "notes": [ { "category": "general", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6927", "url": "https://www.suse.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "SUSE Bug 1080757 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1080757" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-6927", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7566" } ], "notes": [ { "category": "general", "text": "The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7566", "url": "https://www.suse.com/security/cve/CVE-2018-7566" }, { "category": "external", "summary": "SUSE Bug 1083483 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083483" }, { "category": "external", "summary": "SUSE Bug 1083488 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1083488" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7566", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:33:21Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1640-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-6_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1106", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1640-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1640-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1640-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:38:23Z", "generator": { "date": "2018-06-11T08:38:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1640-1", "initial_release_date": "2018-06-11T08:38:23Z", "revision_history": [ { "date": "2018-06-11T08:38:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_38-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:23Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1645-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.103-6_33 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1107", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1645-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1645-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1645-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:38:54Z", "generator": { "date": "2018-06-11T08:38:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1645-1", "initial_release_date": "2018-06-11T08:38:54Z", "revision_history": [ { "date": "2018-06-11T08:38:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_103-6_33-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:38:54Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1530-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_64 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1069,SUSE-SLE-SERVER-12-SP2-2018-1069", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1530-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1530-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1530-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:58Z", "generator": { "date": "2018-06-05T15:36:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1530-1", "initial_release_date": "2018-06-05T15:36:58Z", "revision_history": [ { "date": "2018-06-05T15:36:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_64-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:58Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1546-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_60 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1052,SUSE-SLE-SERVER-12-SP1-2018-1052", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1546-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1546-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181546-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1546-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 21 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:13Z", "generator": { "date": "2018-06-05T14:47:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1546-1", "initial_release_date": "2018-06-05T14:47:13Z", "revision_history": [ { "date": "2018-06-05T14:47:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:13Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:13Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_60-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:13Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:3230-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n\nThese non-security issues were fixed:\n\n- bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly\n- bsc#1027519: Fixed shadow mode guests\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-841", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3230-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3230-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183230-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3230-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1086039", "url": "https://bugzilla.suse.com/1086039" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-10-18T12:44:39Z", "generator": { "date": "2018-10-18T12:44:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3230-1", "initial_release_date": "2018-10-18T12:44:39Z", "revision_history": [ { "date": "2018-10-18T12:44:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-4.7.5_02-43.30.1.x86_64", "product_id": "xen-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "product_id": "xen-doc-html-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64", "product_id": "xen-libs-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "product_id": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64", "product_id": "xen-tools-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "product_id": "xen-tools-domU-4.7.5_02-43.30.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:39Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:39Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:39Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:39Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1516-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-92_50 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1060,SUSE-SLE-SERVER-12-SP2-2018-1060", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1516-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1516-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1516-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:16Z", "generator": { "date": "2018-06-05T14:48:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1516-1", "initial_release_date": "2018-06-05T14:48:16Z", "revision_history": [ { "date": "2018-06-05T14:48:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_50-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:16Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1644-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-94_11 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1109", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1644-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1644-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1644-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:39:58Z", "generator": { "date": "2018-06-11T08:39:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1644-1", "initial_release_date": "2018-06-11T08:39:58Z", "revision_history": [ { "date": "2018-06-11T08:39:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "product_id": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_114-94_11-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:39:58Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1539-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 33 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_125 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1037", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1539-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1539-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181539-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1539-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 33 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T13:41:40Z", "generator": { "date": "2018-06-05T13:41:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1539-1", "initial_release_date": "2018-06-05T13:41:40Z", "revision_history": [ { "date": "2018-06-05T13:41:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:40Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_125-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:40Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1538-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 28 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_101 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1045", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1538-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1538-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181538-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1538-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 28 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:46:18Z", "generator": { "date": "2018-06-05T14:46:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1538-1", "initial_release_date": "2018-06-05T14:46:18Z", "revision_history": [ { "date": "2018-06-05T14:46:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:18Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:18Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_101-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:18Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1532-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_54 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1058,SUSE-SLE-SERVER-12-SP1-2018-1058", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1532-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1532-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181532-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1532-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:48:01Z", "generator": { "date": "2018-06-05T14:48:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1532-1", "initial_release_date": "2018-06-05T14:48:01Z", "revision_history": [ { "date": "2018-06-05T14:48:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:01Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:01Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_54-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:01Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1533-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 30 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_111 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1036", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1533-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1533-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181533-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1533-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 30 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T13:41:33Z", "generator": { "date": "2018-06-05T13:41:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1533-1", "initial_release_date": "2018-06-05T13:41:33Z", "revision_history": [ { "date": "2018-06-05T13:41:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:33Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:33Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_111-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T13:41:33Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1648-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-6_12 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1104", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1648-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1648-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1648-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:37:19Z", "generator": { "date": "2018-06-11T08:37:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1648-1", "initial_release_date": "2018-06-11T08:37:19Z", "revision_history": [ { "date": "2018-06-11T08:37:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_18-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:19Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1505-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_29 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1065,SUSE-SLE-SERVER-12-SP2-2018-1065", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1505-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1505-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1505-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:28Z", "generator": { "date": "2018-06-05T15:36:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1505-1", "initial_release_date": "2018-06-05T15:36:28Z", "revision_history": [ { "date": "2018-06-05T15:36:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_29-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:28Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1220-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c in might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536).\n- CVE-2017-13220: An elevation of privilege vulnerability in the Upstream kernel bluez was fixed. (bnc#1076537).\n- CVE-2017-11089: A buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes (bnc#1088261).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allowed local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- kabi: x86/kaiser: properly align trampoline stack (bsc#1087260).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- usbnet: Fix a race between usbnet_stop() and the BH (bsc#1083275).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-6-2018-845,SUSE-SLE-Module-Public-Cloud-12-2018-845,SUSE-SLE-SAP-12-SP1-2018-845,SUSE-SLE-SERVER-12-SP1-2018-845", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1220-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1220-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1220-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" }, { "category": "self", "summary": "SUSE Bug 1076537", "url": "https://bugzilla.suse.com/1076537" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1083275", "url": "https://bugzilla.suse.com/1083275" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085279", "url": "https://bugzilla.suse.com/1085279" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1086194", "url": "https://bugzilla.suse.com/1086194" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1088261", "url": "https://bugzilla.suse.com/1088261" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11089 page", "url": "https://www.suse.com/security/cve/CVE-2017-11089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13220 page", "url": "https://www.suse.com/security/cve/CVE-2017-13220/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-11T15:30:04Z", "generator": { "date": "2018-05-11T15:30:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1220-1", "initial_release_date": "2018-05-11T15:30:04Z", "revision_history": [ { "date": "2018-05-11T15:30:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.88.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.88.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.88.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.88.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.88.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.88.1.noarch", "product_id": "kernel-source-3.12.74-60.64.88.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.88.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.88.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.88.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.88.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.88.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.88.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 6", "product": { "name": "SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.88.1.noarch as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64 as component of SUSE OpenStack Cloud 6", "product_id": "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.88.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-11089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11089" } ], "notes": [ { "category": "general", "text": "In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11089", "url": "https://www.suse.com/security/cve/CVE-2017-11089" }, { "category": "external", "summary": "SUSE Bug 1088261 for CVE-2017-11089", "url": "https://bugzilla.suse.com/1088261" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-11089" }, { "cve": "CVE-2017-13220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13220" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13220", "url": "https://www.suse.com/security/cve/CVE-2017-13220" }, { "category": "external", "summary": "SUSE Bug 1076537 for CVE-2017-13220", "url": "https://bugzilla.suse.com/1076537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-13220" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-default-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-devel-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-macros-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-source-3.12.74-60.64.88.1.noarch", "SUSE OpenStack Cloud 6:kernel-syms-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-base-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kernel-xen-devel-3.12.74-60.64.88.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-default-1-2.3.1.x86_64", "SUSE OpenStack Cloud 6:kgraft-patch-3_12_74-60_64_88-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:30:04Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1171-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n\nThe following non-security bugs were fixed:\n\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- media: cpia2: Fix a couple off by one bugs (bsc#1050431).\n- nfs: add nostatflush mount option (bsc#1065726).\n- nfs: allow flush-on-stat to be disabled (bsc#1065726).\n- powerpc/fadump: Add a warning when \u0027fadump_reserve_mem=\u0027 is used (bnc#1032084, FATE#323225).\n- powerpc/fadump: reuse crashkernel parameter for fadump memory reservation (bnc#1032084, FATE#323225).\n- powerpc/fadump: update documentation about crashkernel parameter reuse (bnc#1032084, FATE#323225).\n- powerpc/fadump: use \u0027fadump_reserve_mem=\u0027 when specified (bnc#1032084, FATE#323225).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-20180508-13592,slessp4-kernel-source-20180508-13592,slexsp3-kernel-source-20180508-13592", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1171-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1171-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181171-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1171-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003977.html" }, { "category": "self", "summary": "SUSE Bug 1032084", "url": "https://bugzilla.suse.com/1032084" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1065726", "url": "https://bugzilla.suse.com/1065726" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1089665", "url": "https://bugzilla.suse.com/1089665" }, { "category": "self", "summary": "SUSE Bug 1089668", "url": "https://bugzilla.suse.com/1089668" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:38:47Z", "generator": { "date": "2018-05-08T17:38:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1171-1", "initial_release_date": "2018-05-08T17:38:47Z", "revision_history": [ { "date": "2018-05-08T17:38:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.i586", "product": { "name": "kernel-default-3.0.101-108.41.1.i586", "product_id": "kernel-default-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.41.1.i586", "product_id": "kernel-default-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.i586", "product_id": "kernel-default-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.41.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.41.1.i586", "product_id": "kernel-ec2-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.41.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.41.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.41.1.i586", "product": { "name": "kernel-pae-3.0.101-108.41.1.i586", "product_id": "kernel-pae-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.41.1.i586", "product_id": "kernel-pae-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.41.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.i586", "product": { "name": "kernel-source-3.0.101-108.41.1.i586", "product_id": "kernel-source-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.i586", "product": { "name": "kernel-syms-3.0.101-108.41.1.i586", "product_id": "kernel-syms-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.i586", "product": { "name": "kernel-trace-3.0.101-108.41.1.i586", "product_id": "kernel-trace-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.i586", "product_id": "kernel-trace-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.41.1.i586", "product": { "name": "kernel-xen-3.0.101-108.41.1.i586", "product_id": "kernel-xen-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.41.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.41.1.i586", "product_id": "kernel-xen-base-3.0.101-108.41.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.41.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.41.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.41.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.ia64", "product": { "name": "kernel-default-3.0.101-108.41.1.ia64", "product_id": "kernel-default-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.41.1.ia64", "product_id": "kernel-default-base-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.ia64", "product": { "name": "kernel-source-3.0.101-108.41.1.ia64", "product_id": "kernel-source-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.41.1.ia64", "product_id": "kernel-syms-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.41.1.ia64", "product_id": "kernel-trace-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.41.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.41.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.41.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.41.1.noarch", "product_id": "kernel-docs-3.0.101-108.41.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.41.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.41.1.ppc64", "product_id": "kernel-default-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.41.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.41.1.ppc64", "product_id": "kernel-source-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.41.1.ppc64", "product_id": "kernel-syms-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.41.1.ppc64", "product_id": "kernel-trace-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.41.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.41.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-3.0.101-108.41.1.s390x", "product_id": "kernel-default-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.41.1.s390x", "product_id": "kernel-default-base-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.41.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.41.1.s390x", "product_id": "kernel-default-man-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.s390x", "product": { "name": "kernel-source-3.0.101-108.41.1.s390x", "product_id": "kernel-source-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.41.1.s390x", "product_id": "kernel-syms-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.41.1.s390x", "product_id": "kernel-trace-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.41.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.41.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.41.1.x86_64", "product_id": "kernel-default-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.41.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.41.1.x86_64", "product_id": "kernel-source-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.41.1.x86_64", "product_id": "kernel-syms-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.41.1.x86_64", "product_id": "kernel-trace-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.41.1.x86_64", "product_id": "kernel-xen-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.41.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.41.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.41.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.41.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586" }, "product_reference": "kernel-source-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586" }, "product_reference": "kernel-source-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:38:47Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:38:47Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.41.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.41.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:38:47Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1522-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_20 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1070,SUSE-SLE-SERVER-12-SP2-2018-1070", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1522-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1522-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1522-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:37:06Z", "generator": { "date": "2018-06-05T15:37:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1522-1", "initial_release_date": "2018-06-05T15:37:06Z", "revision_history": [ { "date": "2018-06-05T15:37:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_20-default-12-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:06Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1512-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_106 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1046", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1512-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1512-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181512-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1512-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 29 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:46:25Z", "generator": { "date": "2018-06-05T14:46:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1512-1", "initial_release_date": "2018-06-05T14:46:25Z", "revision_history": [ { "date": "2018-06-05T14:46:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:25Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:25Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_106-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:25Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1519-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1051,SUSE-SLE-SERVER-12-SP1-2018-1051", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1519-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1519-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181519-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1519-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:04Z", "generator": { "date": "2018-06-05T14:47:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1519-1", "initial_release_date": "2018-06-05T14:47:04Z", "revision_history": [ { "date": "2018-06-05T14:47:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:04Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:04Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_63-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:04Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1524-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_32 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1064,SUSE-SLE-SERVER-12-SP2-2018-1064", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1524-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1524-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1524-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:20Z", "generator": { "date": "2018-06-05T15:36:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1524-1", "initial_release_date": "2018-06-05T15:36:20Z", "revision_history": [ { "date": "2018-06-05T15:36:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_32-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:20Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1536-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_24 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1071,SUSE-SLE-SERVER-12-SP2-2018-1071", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1536-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1536-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1536-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:37:15Z", "generator": { "date": "2018-06-05T15:37:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1536-1", "initial_release_date": "2018-06-05T15:37:15Z", "revision_history": [ { "date": "2018-06-05T15:37:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_59-92_24-default-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:37:15Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1511-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.114-92_67 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1068,SUSE-SLE-SERVER-12-SP2-2018-1068", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1511-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1511-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1511-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:50Z", "generator": { "date": "2018-06-05T15:36:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1511-1", "initial_release_date": "2018-06-05T15:36:50Z", "revision_history": [ { "date": "2018-06-05T15:36:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_114-92_67-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:50Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1643-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_3 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1101", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1643-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1643-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1643-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:35:49Z", "generator": { "date": "2018-06-11T08:35:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1643-1", "initial_release_date": "2018-06-11T08:35:49Z", "revision_history": [ { "date": "2018-06-11T08:35:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_3-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:35:49Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1549-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 27 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_92 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1040", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1549-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1549-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181549-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1549-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 27 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:45:44Z", "generator": { "date": "2018-06-05T14:45:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1549-1", "initial_release_date": "2018-06-05T14:45:44Z", "revision_history": [ { "date": "2018-06-05T14:45:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:44Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:44Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:44Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1526-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 32 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_122 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1038", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1526-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1526-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181526-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1526-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 32 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:45:30Z", "generator": { "date": "2018-06-05T14:45:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1526-1", "initial_release_date": "2018-06-05T14:45:30Z", "revision_history": [ { "date": "2018-06-05T14:45:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:30Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:30Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_122-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:30Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1520-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 26 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_89 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1039", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1520-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1520-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181520-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1520-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 26 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:45:37Z", "generator": { "date": "2018-06-05T14:45:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1520-1", "initial_release_date": "2018-06-05T14:45:37Z", "revision_history": [ { "date": "2018-06-05T14:45:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:37Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:37Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:37Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1637-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.92-6_30 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1105", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1637-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1637-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1637-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:37:51Z", "generator": { "date": "2018-06-11T08:37:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1637-1", "initial_release_date": "2018-06-11T08:37:51Z", "revision_history": [ { "date": "2018-06-11T08:37:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "product_id": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64", "product_id": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_92-6_30-default-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:37:51Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1535-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 22 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_77 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1043", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1535-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1535-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181535-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1535-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 22 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:46:04Z", "generator": { "date": "2018-06-05T14:46:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1535-1", "initial_release_date": "2018-06-05T14:46:04Z", "revision_history": [ { "date": "2018-06-05T14:46:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:04Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:04Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-11-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-11-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:04Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1173-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n\nThe following non-security bugs were fixed:\n\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B\u0026W PX headphones (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- Partial revert \u0027e1000e: Avoid receiver overrun interrupt bursts\u0027 (bsc#1075428).\n- Revert \u0027e1000e: Separate signaling for link check/link up\u0027 (bsc#1075428).\n- Revert \u0027led: core: Fix brightness setting when setting delay_off=0\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block\u0027s level and first key (bsc#1084721).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- rpm/config.sh: ensure sorted patches.\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).\n- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).\n- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-814,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-814,SUSE-SLE-SAP-12-SP2-2018-814,SUSE-SLE-SERVER-12-SP2-2018-814,SUSE-Storage-4-2018-814", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1173-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1173-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1173-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1046610", "url": "https://bugzilla.suse.com/1046610" }, { "category": "self", "summary": "SUSE Bug 1057734", "url": "https://bugzilla.suse.com/1057734" }, { "category": "self", "summary": "SUSE Bug 1070536", "url": "https://bugzilla.suse.com/1070536" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076847", "url": "https://bugzilla.suse.com/1076847" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083745", "url": "https://bugzilla.suse.com/1083745" }, { "category": "self", "summary": "SUSE Bug 1083836", "url": "https://bugzilla.suse.com/1083836" }, { "category": "self", "summary": "SUSE Bug 1084353", "url": "https://bugzilla.suse.com/1084353" }, { "category": "self", "summary": "SUSE Bug 1084610", "url": "https://bugzilla.suse.com/1084610" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1084829", "url": "https://bugzilla.suse.com/1084829" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085224", "url": "https://bugzilla.suse.com/1085224" }, { "category": "self", "summary": "SUSE Bug 1085402", "url": "https://bugzilla.suse.com/1085402" }, { "category": "self", "summary": "SUSE Bug 1085404", "url": "https://bugzilla.suse.com/1085404" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1086194", "url": "https://bugzilla.suse.com/1086194" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087845", "url": "https://bugzilla.suse.com/1087845" }, { "category": "self", "summary": "SUSE Bug 1088241", "url": "https://bugzilla.suse.com/1088241" }, { "category": "self", "summary": "SUSE Bug 1088242", "url": "https://bugzilla.suse.com/1088242" }, { "category": "self", "summary": "SUSE Bug 1088600", "url": "https://bugzilla.suse.com/1088600" }, { "category": "self", "summary": "SUSE Bug 1088684", "url": "https://bugzilla.suse.com/1088684" }, { "category": "self", "summary": "SUSE Bug 1089198", "url": "https://bugzilla.suse.com/1089198" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18257 page", "url": "https://www.suse.com/security/cve/CVE-2017-18257/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7740 page", "url": "https://www.suse.com/security/cve/CVE-2018-7740/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-08T17:34:59Z", "generator": { "date": "2018-05-08T17:34:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1173-1", "initial_release_date": "2018-05-08T17:34:59Z", "revision_history": [ { "date": "2018-05-08T17:34:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.73.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.73.1.noarch", "product_id": "kernel-devel-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.73.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.73.1.noarch", "product_id": "kernel-macros-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.73.1.noarch", "product": { "name": "kernel-source-4.4.121-92.73.1.noarch", "product_id": "kernel-source-4.4.121-92.73.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.73.1.ppc64le", "product_id": "kernel-default-4.4.121-92.73.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.73.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.73.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.73.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.73.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.73.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-4.4.121-92.73.1.s390x", "product_id": "kernel-default-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.73.1.s390x", "product_id": "kernel-default-base-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.73.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.73.1.s390x", "product_id": "kernel-default-man-4.4.121-92.73.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.73.1.s390x", "product_id": "kernel-syms-4.4.121-92.73.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product_id": "kernel-syms-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.73.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.73.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18257" } ], "notes": [ { "category": "general", "text": "The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18257", "url": "https://www.suse.com/security/cve/CVE-2017-18257" }, { "category": "external", "summary": "SUSE Bug 1088241 for CVE-2017-18257", "url": "https://bugzilla.suse.com/1088241" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2017-18257" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7740" } ], "notes": [ { "category": "general", "text": "The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7740", "url": "https://www.suse.com/security/cve/CVE-2018-7740" }, { "category": "external", "summary": "SUSE Bug 1084353 for CVE-2018-7740", "url": "https://bugzilla.suse.com/1084353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2018-7740" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.73.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.73.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-08T17:34:59Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1636-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.120-94_17 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1110", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1636-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1636-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1636-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:40:31Z", "generator": { "date": "2018-06-11T08:40:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1636-1", "initial_release_date": "2018-06-11T08:40:31Z", "revision_history": [ { "date": "2018-06-11T08:40:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "product": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "product_id": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:40:31Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:40:31Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_120-94_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:40:31Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1181-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n- CVE-2018-7550: The load_multiboot function allowed local guest OS users to\n execute arbitrary code on the host via a mh_load_end_addr value greater than\n mh_bss_end_addr, which triggers an out-of-bounds read or write memory access\n (bsc#1083292).\n\nThese non-security issues were fixed:\n\n- bsc#1072834: Prevent unchecked MSR access error\n- bsc#1035442: Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100\n seconds, allowing for more domUs to be shutdown in parallel\n- bsc#1057493: Prevent DomU crash\n\n ", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-xen-13593,slessp4-xen-13593", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1181-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1181-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181181-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1181-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1035442", "url": "https://bugzilla.suse.com/1035442" }, { "category": "self", "summary": "SUSE Bug 1057493", "url": "https://bugzilla.suse.com/1057493" }, { "category": "self", "summary": "SUSE Bug 1072834", "url": "https://bugzilla.suse.com/1072834" }, { "category": "self", "summary": "SUSE Bug 1083292", "url": "https://bugzilla.suse.com/1083292" }, { "category": "self", "summary": "SUSE Bug 1086107", "url": "https://bugzilla.suse.com/1086107" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7550 page", "url": "https://www.suse.com/security/cve/CVE-2018-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-05-09T11:31:36Z", "generator": { "date": "2018-05-09T11:31:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1181-1", "initial_release_date": "2018-05-09T11:31:36Z", "revision_history": [ { "date": "2018-05-09T11:31:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-devel-4.4.4_30-61.26.1.i586", "product": { "name": "xen-devel-4.4.4_30-61.26.1.i586", "product_id": "xen-devel-4.4.4_30-61.26.1.i586" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "product": { "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "product_id": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "product": { "name": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "product_id": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.4.4_30-61.26.1.i586", "product": { "name": "xen-libs-4.4.4_30-61.26.1.i586", "product_id": "xen-libs-4.4.4_30-61.26.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_30-61.26.1.i586", "product": { "name": "xen-tools-domU-4.4.4_30-61.26.1.i586", "product_id": "xen-tools-domU-4.4.4_30-61.26.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-devel-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-devel-4.4.4_30-61.26.1.x86_64", "product_id": "xen-devel-4.4.4_30-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-4.4.4_30-61.26.1.x86_64", "product_id": "xen-4.4.4_30-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-doc-html-4.4.4_30-61.26.1.x86_64", "product_id": "xen-doc-html-4.4.4_30-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "product": { "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "product_id": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-libs-4.4.4_30-61.26.1.x86_64", "product_id": "xen-libs-4.4.4_30-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "product_id": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-tools-4.4.4_30-61.26.1.x86_64", "product_id": "xen-tools-4.4.4_30-61.26.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_30-61.26.1.x86_64", "product": { "name": "xen-tools-domU-4.4.4_30-61.26.1.x86_64", "product_id": "xen-tools-domU-4.4.4_30-61.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.4_30-61.26.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586" }, "product_reference": "xen-devel-4.4.4_30-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-devel-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586" }, "product_reference": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586" }, "product_reference": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_30-61.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586" }, "product_reference": "xen-libs-4.4.4_30-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-libs-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-tools-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_30-61.26.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586" }, "product_reference": "xen-tools-domU-4.4.4_30-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586" }, "product_reference": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586" }, "product_reference": "xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_30-61.26.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586" }, "product_reference": "xen-libs-4.4.4_30-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-libs-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-tools-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_30-61.26.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586" }, "product_reference": "xen-tools-domU-4.4.4_30-61.26.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_30-61.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_30-61.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:31:36Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:31:36Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7550" } ], "notes": [ { "category": "general", "text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7550", "url": "https://www.suse.com/security/cve/CVE-2018-7550" }, { "category": "external", "summary": "SUSE Bug 1083291 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083291" }, { "category": "external", "summary": "SUSE Bug 1083292 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:31:36Z", "details": "important" } ], "title": "CVE-2018-7550" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_30_3.0.101_108.38-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_30_3.0.101_108.38-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_30-61.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_30-61.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:31:36Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1529-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 24 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_83 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1041", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1529-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1529-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181529-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1529-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 24 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:45:50Z", "generator": { "date": "2018-06-05T14:45:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1529-1", "initial_release_date": "2018-06-05T14:45:50Z", "revision_history": [ { "date": "2018-06-05T14:45:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:50Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:50Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:50Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1548-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.90-92_45 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1061,SUSE-SLE-SERVER-12-SP2-2018-1061", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1548-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1548-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1548-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:23Z", "generator": { "date": "2018-06-05T14:48:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1548-1", "initial_release_date": "2018-06-05T14:48:23Z", "revision_history": [ { "date": "2018-06-05T14:48:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_90-92_45-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:23Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1221-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might allow local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1084536 1087209).\n- CVE-2017-13220: An elevation of privilege vulnerability in the Upstream kernel bluez was fixed. (bnc#1076537).\n- CVE-2017-11089: A buffer overread was observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes (bnc#1088261).\n- CVE-2017-0861: Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem allowed attackers to gain privileges via unspecified vectors (bnc#1088260).\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2017-18203: The dm_get_from_kobject function in drivers/md/dm.c allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices (bnc#1083242).\n\nThe following non-security bugs were fixed:\n\n- Integrate fixes resulting from bsc#1088147 More info in the respective commit messages.\n- KABI: x86/kaiser: properly align trampoline stack (bsc#1087260).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: properly align trampoline stack (bsc#1087260).\n- x86/retpoline: do not perform thunk calls in ring3 vsyscall code (bsc#1085331).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-844,SUSE-SLE-SERVER-12-2018-844", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1221-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1221-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1221-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" }, { "category": "self", "summary": "SUSE Bug 1076537", "url": "https://bugzilla.suse.com/1076537" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083242", "url": "https://bugzilla.suse.com/1083242" }, { "category": "self", "summary": "SUSE Bug 1084536", "url": "https://bugzilla.suse.com/1084536" }, { "category": "self", "summary": "SUSE Bug 1085331", "url": "https://bugzilla.suse.com/1085331" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087209", "url": "https://bugzilla.suse.com/1087209" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1088147", "url": "https://bugzilla.suse.com/1088147" }, { "category": "self", "summary": "SUSE Bug 1088260", "url": "https://bugzilla.suse.com/1088260" }, { "category": "self", "summary": "SUSE Bug 1088261", "url": "https://bugzilla.suse.com/1088261" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0861 page", "url": "https://www.suse.com/security/cve/CVE-2017-0861/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11089 page", "url": "https://www.suse.com/security/cve/CVE-2017-11089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13220 page", "url": "https://www.suse.com/security/cve/CVE-2017-13220/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18203 page", "url": "https://www.suse.com/security/cve/CVE-2017-18203/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7757 page", "url": "https://www.suse.com/security/cve/CVE-2018-7757/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-11T15:16:24Z", "generator": { "date": "2018-05-11T15:16:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1221-1", "initial_release_date": "2018-05-11T15:16:24Z", "revision_history": [ { "date": "2018-05-11T15:16:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.128.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.128.1.noarch", "product_id": "kernel-devel-3.12.61-52.128.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.128.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.128.1.noarch", "product_id": "kernel-macros-3.12.61-52.128.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.128.1.noarch", "product": { "name": "kernel-source-3.12.61-52.128.1.noarch", "product_id": "kernel-source-3.12.61-52.128.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.128.1.ppc64le", "product_id": "kernel-default-3.12.61-52.128.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.128.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.128.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.128.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.128.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.128.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.128.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.128.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-3.12.61-52.128.1.s390x", "product_id": "kernel-default-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.128.1.s390x", "product_id": "kernel-default-base-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.128.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.128.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.128.1.s390x", "product_id": "kernel-default-man-3.12.61-52.128.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.128.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.128.1.s390x", "product_id": "kernel-syms-3.12.61-52.128.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.128.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.128.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.128.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.128.1.x86_64", "product_id": "kernel-default-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.128.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.128.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.128.1.x86_64", "product_id": "kernel-syms-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.128.1.x86_64", "product_id": "kernel-xen-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.128.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.128.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.128.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.128.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.128.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.128.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.128.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.128.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.128.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.128.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.128.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.128.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.128.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.128.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.128.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.128.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0861", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0861" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0861", "url": "https://www.suse.com/security/cve/CVE-2017-0861" }, { "category": "external", "summary": "SUSE Bug 1088260 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088260" }, { "category": "external", "summary": "SUSE Bug 1088268 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1088268" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-0861", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-0861" }, { "cve": "CVE-2017-11089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11089" } ], "notes": [ { "category": "general", "text": "In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11089", "url": "https://www.suse.com/security/cve/CVE-2017-11089" }, { "category": "external", "summary": "SUSE Bug 1088261 for CVE-2017-11089", "url": "https://bugzilla.suse.com/1088261" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-11089" }, { "cve": "CVE-2017-13220", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13220" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13220", "url": "https://www.suse.com/security/cve/CVE-2017-13220" }, { "category": "external", "summary": "SUSE Bug 1076537 for CVE-2017-13220", "url": "https://bugzilla.suse.com/1076537" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-13220" }, { "cve": "CVE-2017-18203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18203" } ], "notes": [ { "category": "general", "text": "The dm_get_from_kobject function in drivers/md/dm.c in the Linux kernel before 4.14.3 allow local users to cause a denial of service (BUG) by leveraging a race condition with __dm_destroy during creation and removal of DM devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18203", "url": "https://www.suse.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "SUSE Bug 1083242 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1083242" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-18203", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2017-18203" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7757" } ], "notes": [ { "category": "general", "text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7757", "url": "https://www.suse.com/security/cve/CVE-2018-7757" }, { "category": "external", "summary": "SUSE Bug 1084536 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1084536" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087209 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1087209" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-7757", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2018-7757" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.128.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.128.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_128-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T15:16:24Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1540-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_86 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-1042", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1540-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1540-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181540-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1540-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12)", "tracking": { "current_release_date": "2018-06-05T14:45:57Z", "generator": { "date": "2018-06-05T14:45:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1540-1", "initial_release_date": "2018-06-05T14:45:57Z", "revision_history": [ { "date": "2018-06-05T14:45:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:57Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:57Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:45:57Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1545-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_38 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1066,SUSE-SLE-SERVER-12-SP2-2018-1066", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1545-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1545-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1545-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:35Z", "generator": { "date": "2018-06-05T15:36:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1545-1", "initial_release_date": "2018-06-05T15:36:35Z", "revision_history": [ { "date": "2018-06-05T15:36:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_38-default-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:35Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1177-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n- CVE-2018-7550: The load_multiboot function allowed local guest OS users to\n execute arbitrary code on the host via a mh_load_end_addr value greater than\n mh_bss_end_addr, which triggers an out-of-bounds read or write memory access\n (bsc#1083292).\n\nThis non-security issue was fixed:\n\n- bsc#1072834: Prevent unchecked MSR access error\n- bsc#1057493: Prevent DomU crashes\n- bsc#1086107: Fixed problems with backports for XSA-246 and XSA-247\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-819", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1177-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1177-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181177-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1177-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1057493", "url": "https://bugzilla.suse.com/1057493" }, { "category": "self", "summary": "SUSE Bug 1072834", "url": "https://bugzilla.suse.com/1072834" }, { "category": "self", "summary": "SUSE Bug 1083292", "url": "https://bugzilla.suse.com/1083292" }, { "category": "self", "summary": "SUSE Bug 1086107", "url": "https://bugzilla.suse.com/1086107" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7550 page", "url": "https://www.suse.com/security/cve/CVE-2018-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-05-09T11:30:52Z", "generator": { "date": "2018-05-09T11:30:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1177-1", "initial_release_date": "2018-05-09T11:30:52Z", "revision_history": [ { "date": "2018-05-09T11:30:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.4.4_30-22.65.1.x86_64", "product": { "name": "xen-4.4.4_30-22.65.1.x86_64", "product_id": "xen-4.4.4_30-22.65.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.4.4_30-22.65.1.x86_64", "product": { "name": "xen-doc-html-4.4.4_30-22.65.1.x86_64", "product_id": "xen-doc-html-4.4.4_30-22.65.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "product": { "name": "xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "product_id": "xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.4.4_30-22.65.1.x86_64", "product": { "name": "xen-libs-4.4.4_30-22.65.1.x86_64", "product_id": "xen-libs-4.4.4_30-22.65.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "product": { "name": "xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "product_id": "xen-libs-32bit-4.4.4_30-22.65.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.4.4_30-22.65.1.x86_64", "product": { "name": "xen-tools-4.4.4_30-22.65.1.x86_64", "product_id": "xen-tools-4.4.4_30-22.65.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.4.4_30-22.65.1.x86_64", "product": { "name": "xen-tools-domU-4.4.4_30-22.65.1.x86_64", "product_id": "xen-tools-domU-4.4.4_30-22.65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.4.4_30-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64" }, "product_reference": "xen-4.4.4_30-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.4.4_30-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64" }, "product_reference": "xen-doc-html-4.4.4_30-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64" }, "product_reference": "xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.4.4_30-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64" }, "product_reference": "xen-libs-4.4.4_30-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.4.4_30-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64" }, "product_reference": "xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.4.4_30-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64" }, "product_reference": "xen-tools-4.4.4_30-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.4.4_30-22.65.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" }, "product_reference": "xen-tools-domU-4.4.4_30-22.65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:30:52Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:30:52Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7550" } ], "notes": [ { "category": "general", "text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7550", "url": "https://www.suse.com/security/cve/CVE-2018-7550" }, { "category": "external", "summary": "SUSE Bug 1083291 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083291" }, { "category": "external", "summary": "SUSE Bug 1083292 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:30:52Z", "details": "important" } ], "title": "CVE-2018-7550" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_30_k3.12.61_52.125-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_30-22.65.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_30-22.65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-09T11:30:52Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1523-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.120-92_70 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1059,SUSE-SLE-SERVER-12-SP2-2018-1059", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1523-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1523-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1523-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T14:48:08Z", "generator": { "date": "2018-06-05T14:48:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1523-1", "initial_release_date": "2018-06-05T14:48:08Z", "revision_history": [ { "date": "2018-06-05T14:48:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:08Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:08Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_120-92_70-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:48:08Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1203-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n- CVE-2018-7550: The load_multiboot function allowed local guest OS users to\n execute arbitrary code on the host via a mh_load_end_addr value greater than\n mh_bss_end_addr, which triggers an out-of-bounds read or write memory access\n (bsc#1083292).\n ", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-xen-13595,slessp3-xen-13595", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1203-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1203-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181203-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1203-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" }, { "category": "self", "summary": "SUSE Bug 1083292", "url": "https://bugzilla.suse.com/1083292" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7550 page", "url": "https://www.suse.com/security/cve/CVE-2018-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-05-10T15:10:54Z", "generator": { "date": "2018-05-10T15:10:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1203-1", "initial_release_date": "2018-05-10T15:10:54Z", "revision_history": [ { "date": "2018-05-10T15:10:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "product": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586" } }, { "category": "product_version", "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "product": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586" } }, { "category": "product_version", "name": "xen-libs-4.2.5_21-45.22.1.i586", "product": { "name": "xen-libs-4.2.5_21-45.22.1.i586", "product_id": "xen-libs-4.2.5_21-45.22.1.i586" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_21-45.22.1.i586", "product": { "name": "xen-tools-domU-4.2.5_21-45.22.1.i586", "product_id": "xen-tools-domU-4.2.5_21-45.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "xen-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-4.2.5_21-45.22.1.x86_64", "product_id": "xen-4.2.5_21-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-doc-html-4.2.5_21-45.22.1.x86_64", "product_id": "xen-doc-html-4.2.5_21-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "product_id": "xen-doc-pdf-4.2.5_21-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "product": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-libs-4.2.5_21-45.22.1.x86_64", "product_id": "xen-libs-4.2.5_21-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "product_id": "xen-libs-32bit-4.2.5_21-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-tools-4.2.5_21-45.22.1.x86_64", "product_id": "xen-tools-4.2.5_21-45.22.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.2.5_21-45.22.1.x86_64", "product": { "name": "xen-tools-domU-4.2.5_21-45.22.1.x86_64", "product_id": "xen-tools-domU-4.2.5_21-45.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-45.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586" }, "product_reference": "xen-libs-4.2.5_21-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-45.22.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_21-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-doc-html-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-pdf-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64" }, "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586" }, "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-45.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586" }, "product_reference": "xen-libs-4.2.5_21-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-libs-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-tools-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-45.22.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586" }, "product_reference": "xen-tools-domU-4.2.5_21-45.22.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.2.5_21-45.22.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" }, "product_reference": "xen-tools-domU-4.2.5_21-45.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T15:10:54Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T15:10:54Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7550" } ], "notes": [ { "category": "general", "text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7550", "url": "https://www.suse.com/security/cve/CVE-2018-7550" }, { "category": "external", "summary": "SUSE Bug 1083291 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083291" }, { "category": "external", "summary": "SUSE Bug 1083292 for CVE-2018-7550", "url": "https://bugzilla.suse.com/1083292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T15:10:54Z", "details": "important" } ], "title": "CVE-2018-7550" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.19-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.19-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.22.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-10T15:10:54Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1528-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_82 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1048,SUSE-SLE-SERVER-12-SP1-2018-1048", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1528-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1528-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181528-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1528-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 25 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:46:40Z", "generator": { "date": "2018-06-05T14:46:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1528-1", "initial_release_date": "2018-06-05T14:46:40Z", "revision_history": [ { "date": "2018-06-05T14:46:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:40Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:40Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_82-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:46:40Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1216-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for xen", "title": "Title of the patch" }, { "category": "description", "text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-8897: Prevent mishandling of debug exceptions on x86 (XSA-260, bsc#1090820)\n- Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy\n HVM guests from causing a hypervisor crash or potentially privilege\n escalation/information leaks (XSA-261, bsc#1090822)\n- Prevent unbounded loop, induced by qemu allowing an attacker to permanently\n keep a physical CPU core busy (XSA-262, bsc#1090823)\n- CVE-2018-10472: x86 HVM guest OS users (in certain configurations) were able\n to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction\n with specifying the target file as the backing file of a snapshot\n (bsc#1089152).\n- CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service\n (out-of-bounds zero write and hypervisor crash) via unexpected INT 80\n processing, because of an incorrect fix for CVE-2017-5754 (bsc#1089635).\n\nThese non-security issues were fixed:\n\n- bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly\n- bsc#1027519: Fixed shadow mode guests\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-841,SUSE-SLE-SAP-12-SP2-2018-841,SUSE-SLE-SERVER-12-SP2-2018-841,SUSE-Storage-4-2018-841", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1216-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1216-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181216-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1216-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/003995.html" }, { "category": "self", "summary": "SUSE Bug 1027519", "url": "https://bugzilla.suse.com/1027519" }, { "category": "self", "summary": "SUSE Bug 1086039", "url": "https://bugzilla.suse.com/1086039" }, { "category": "self", "summary": "SUSE Bug 1089152", "url": "https://bugzilla.suse.com/1089152" }, { "category": "self", "summary": "SUSE Bug 1089635", "url": "https://bugzilla.suse.com/1089635" }, { "category": "self", "summary": "SUSE Bug 1090820", "url": "https://bugzilla.suse.com/1090820" }, { "category": "self", "summary": "SUSE Bug 1090822", "url": "https://bugzilla.suse.com/1090822" }, { "category": "self", "summary": "SUSE Bug 1090823", "url": "https://bugzilla.suse.com/1090823" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for xen", "tracking": { "current_release_date": "2018-05-11T07:58:54Z", "generator": { "date": "2018-05-11T07:58:54Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1216-1", "initial_release_date": "2018-05-11T07:58:54Z", "revision_history": [ { "date": "2018-05-11T07:58:54Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-4.7.5_02-43.30.1.x86_64", "product_id": "xen-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "product_id": "xen-doc-html-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64", "product_id": "xen-libs-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "product_id": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64", "product_id": "xen-tools-4.7.5_02-43.30.1.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "product": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "product_id": "xen-tools-domU-4.7.5_02-43.30.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.5_02-43.30.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.7.5_02-43.30.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.7.5_02-43.30.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-doc-html-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.7.5_02-43.30.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.7.5_02-43.30.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.7.5_02-43.30.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64" }, "product_reference": "xen-tools-domU-4.7.5_02-43.30.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T07:58:54Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T07:58:54Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:xen-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-libs-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-4.7.5_02-43.30.1.x86_64", "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_02-43.30.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-11T07:58:54Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1641-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.82-6_9 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-SP3-2018-1102", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1641-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1641-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1641-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)", "tracking": { "current_release_date": "2018-06-11T08:36:19Z", "generator": { "date": "2018-06-11T08:36:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1641-1", "initial_release_date": "2018-06-11T08:36:19Z", "revision_history": [ { "date": "2018-06-11T08:36:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_82-6_9-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-11T08:36:19Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1531-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.74-60_64_51 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2018-1057,SUSE-SLE-SERVER-12-SP1-2018-1057", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1531-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1531-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181531-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1531-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1)", "tracking": { "current_release_date": "2018-06-05T14:47:52Z", "generator": { "date": "2018-06-05T14:47:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1531-1", "initial_release_date": "2018-06-05T14:47:52Z", "revision_history": [ { "date": "2018-06-05T14:47:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:52Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:52Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_51-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T14:47:52Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1534-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.74-92_35 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2017-13166: An elevation of privilege vulnerability in the kernel v4l2 video driver was fixed. (bsc#1085447).\n- CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs (bsc#1090368).\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090646).\n- bsc#1083125: Fixed kgraft: small race in reversion code\n- CVE-2018-1087: kernel KVM was vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest (bsc#1090869)\nbefore\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP2-2018-1067,SUSE-SLE-SERVER-12-SP2-2018-1067", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1534-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1534-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1534-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1085447", "url": "https://bugzilla.suse.com/1085447" }, { "category": "self", "summary": "SUSE Bug 1090368", "url": "https://bugzilla.suse.com/1090368" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090869", "url": "https://bugzilla.suse.com/1090869" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13166 page", "url": "https://www.suse.com/security/cve/CVE-2017-13166/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2)", "tracking": { "current_release_date": "2018-06-05T15:36:42Z", "generator": { "date": "2018-06-05T15:36:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1534-1", "initial_release_date": "2018-06-05T15:36:42Z", "revision_history": [ { "date": "2018-06-05T15:36:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "product_id": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13166" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13166", "url": "https://www.suse.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "SUSE Bug 1072865 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1072865" }, { "category": "external", "summary": "SUSE Bug 1085447 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1085447" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-13166", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2017-13166" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_74-92_35-default-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-05T15:36:42Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
suse-su-2018:1173-2
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to 4.4.121 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c had an integer-overflow vulnerability that allowed local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2017-18257: The __get_data_block function in fs/f2fs/data.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl. (bnc#1088241)\n- CVE-2018-8822: Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c could be exploited by malicious NCPFS servers to crash the kernel or execute code (bnc#1086162).\n- CVE-2018-8043: The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c did not validate certain resource availability, which allowed local users to cause a denial of service (NULL pointer dereference) (bnc#1084829).\n- CVE-2018-7740: The resv_map_release function in mm/hugetlb.c allowed local users to cause a denial of service (BUG) via a crafted application that made mmap system calls and has a large pgoff argument to the remap_file_pages system call (bnc#1084353).\n- CVE-2018-1087: And an unprivileged KVM guest user could use this flaw to potentially escalate their privileges inside a guest. (bsc#1087088)\n- CVE-2018-8897: An unprivileged system user could use incorrect set up interrupt stacks to crash the Linux kernel resulting in DoS issue. (bsc#1087088)\n\nThe following non-security bugs were fixed:\n\n- alsa: hda/realtek - Fix speaker no sound after system resume (bsc#1031717).\n- alsa: hda: Add a power_save blacklist (bnc#1012382).\n- alsa: usb-audio: Add a quirck for B\u0026W PX headphones (bnc#1012382).\n- arm: dts: LogicPD Torpedo: Fix I2C1 pinmux (bnc#1012382).\n- arm: mvebu: Fix broken PL310_ERRATA_753970 selects (bnc#1012382).\n- kvm: mmu: Fix overlap between public and private memslots (bnc#1012382).\n- Partial revert \u0027e1000e: Avoid receiver overrun interrupt bursts\u0027 (bsc#1075428).\n- Revert \u0027e1000e: Separate signaling for link check/link up\u0027 (bsc#1075428).\n- Revert \u0027led: core: Fix brightness setting when setting delay_off=0\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 5d4a2355a2a1c2ec6fdf9d18b68ca0a04ff73c70.\n- bpf, x64: implement retpoline for tail call (bnc#1012382).\n- bridge: check brport attr show in brport_show (bnc#1012382).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block\u0027s level and first key (bsc#1084721).\n- btrfs: preserve i_mode if __btrfs_set_acl() fails (bnc#1012382).\n- ch9200: use skb_cow_head() to deal with cloned skbs (bsc#1088684).\n- cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() (bnc#1012382).\n- dcache: Add cond_resched in shrink_dentry_list (bsc#1086194).\n- dm io: fix duplicate bio completion due to missing ref count (bnc#1012382).\n- drm/i915/cmdparser: Do not check past the cmd length (bsc#1031717).\n- drm/i915/psr: Check for the specific AUX_FRAME_SYNC cap bit (bsc#1031717).\n- e1000e: Avoid missed interrupts following ICR read (bsc#1075428).\n- e1000e: Avoid receiver overrun interrupt bursts (bsc#1075428).\n- e1000e: Fix check_for_link return value with autoneg off (bsc#1075428).\n- e1000e: Fix link check race condition (bsc#1075428).\n- e1000e: Fix queue interrupt re-raising in Other interrupt (bsc#1075428).\n- e1000e: Remove Other from EIAC (bsc#1075428).\n- fib_semantics: Do not match route with mismatching tclassid (bnc#1012382).\n- fs/hugetlbfs/inode.c: change put_page/unlock_page order in hugetlbfs_fallocate() (git-fixes, bsc#1083745).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (bnc#1012382).\n- hugetlbfs: fix offset overflow in hugetlbfs mmap (bnc#1084353).\n- ibmvfc: Avoid unnecessary port relogin (bsc#1085404).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Disable irqs before exiting reset from closed state (bsc#1084610).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Do not reset CRQ for Mobility driver resets (bsc#1088600).\n- ibmvnic: Fix DMA mapping mistakes (bsc#1088600).\n- ibmvnic: Fix failover case for non-redundant configuration (bsc#1088600).\n- ibmvnic: Fix reset return from closed state (bsc#1084610).\n- ibmvnic: Fix reset scheduler error handling (bsc#1088600).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ibmvnic: Potential NULL dereference in clean_one_tx_pool() (bsc#1085224, git-fixes).\n- ibmvnic: Remove unused TSO resources in TX pool structure (bsc#1085224).\n- ibmvnic: Update TX pool cleaning routine (bsc#1085224).\n- ibmvnic: Zero used TX descriptor counter on reset (bsc#1088600).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kvm/x86: fix icebp instruction handling (bnc#1012382).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- mac80211: do not WARN on bad WMM parameters from buggy APs (bsc#1031717).\n- md-cluster: fix wrong condition check in raid1_write_request (bsc#1085402).\n- media: au0828: fix VIDEO_V4L2 dependency (bsc#1031717).\n- media: cx25821: prevent out-of-bounds read on array card (bsc#1031717).\n- media: m88ds3103: do not call a non-initalized function (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bsc#1031717).\n- mm/hugetlb.c: do not call region_abort if region_chg fails (bnc#1084353).\n- mpls, nospec: Sanitize array index in mpls_label_ok() (bnc#1012382).\n- net: fix race on decreasing number of TX queues (bnc#1012382).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (bnc#1012382).\n- net: mpls: Pull common label check into helper (bnc#1012382).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (bnc#1012382).\n- nospec: Allow index argument to have const-qualified type (bnc#1012382).\n- perf/x86/intel: Add model number for Skylake Server to perf (FATE#321269).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- ppp: prevent unregistered channels from connecting to PPP units (bnc#1012382).\n- regmap-i2c: Off by one in regmap_i2c_smbus_i2c_read/write() (bsc#1031717).\n- regmap: Do not use format_val in regmap_bulk_read (bsc#1031717).\n- regmap: Fix reversed bounds check in regmap_raw_write() (bsc#1031717).\n- regmap: Format data for raw write in regmap_bulk_write (bsc#1031717).\n- rpm/config.sh: ensure sorted patches.\n- s390/cpuinfo: show facilities as reported by stfle (bnc#1076847, LTC#163740).\n- s390/qeth: fix IPA command submission race (bnc#1012382).\n- s390/qeth: fix SETIP command handling (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v4_get_dst (bnc#1012382).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (bnc#1012382).\n- sctp: verify size of a new chunk in _sctp_make_chunk() (bnc#1012382).\n- storvsc: do not schedule work elements during host reset (bsc#1070536, bsc#1057734).\n- storvsc_drv: use embedded work structure for host rescan (bsc#1070536, bsc#1057734).\n- storvsc_drv: use separate workqueue for rescan (bsc#1070536, bsc#1057734).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus (bnc#1012382).\n- udplite: fix partial checksum initialization (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- x86/apic/vector: Handle legacy irq data correctly (bnc#1012382).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: Duplicate cpu_tss for an entry trampoline usage (bsc#1077560 bsc#1083836).\n- x86/kaiser: Remove a user mapping of cpu_tss structure (bsc#1077560 bsc#1083836).\n- x86/kaiser: Use a per-CPU trampoline stack for kernel entry (bsc#1077560).\n- x86/kaiser: enforce trampoline stack alignment (bsc#1087260).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n- xen-blkfront: fix mq start/stop race (bsc#1085042).\n- xen-netback: use skb to determine number of required guest Rx requests (bsc#1046610).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-814", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1173-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1173-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1173-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1046610", "url": "https://bugzilla.suse.com/1046610" }, { "category": "self", "summary": "SUSE Bug 1057734", "url": "https://bugzilla.suse.com/1057734" }, { "category": "self", "summary": "SUSE Bug 1070536", "url": "https://bugzilla.suse.com/1070536" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076847", "url": "https://bugzilla.suse.com/1076847" }, { "category": "self", "summary": "SUSE Bug 1077560", "url": "https://bugzilla.suse.com/1077560" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083745", "url": "https://bugzilla.suse.com/1083745" }, { "category": "self", "summary": "SUSE Bug 1083836", "url": "https://bugzilla.suse.com/1083836" }, { "category": "self", "summary": "SUSE Bug 1084353", "url": "https://bugzilla.suse.com/1084353" }, { "category": "self", "summary": "SUSE Bug 1084610", "url": "https://bugzilla.suse.com/1084610" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1084829", "url": "https://bugzilla.suse.com/1084829" }, { "category": "self", "summary": "SUSE Bug 1085042", "url": "https://bugzilla.suse.com/1085042" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085224", "url": "https://bugzilla.suse.com/1085224" }, { "category": "self", "summary": "SUSE Bug 1085402", "url": "https://bugzilla.suse.com/1085402" }, { "category": "self", "summary": "SUSE Bug 1085404", "url": "https://bugzilla.suse.com/1085404" }, { "category": "self", "summary": "SUSE Bug 1086162", "url": "https://bugzilla.suse.com/1086162" }, { "category": "self", "summary": "SUSE Bug 1086194", "url": "https://bugzilla.suse.com/1086194" }, { "category": "self", "summary": "SUSE Bug 1087088", "url": "https://bugzilla.suse.com/1087088" }, { "category": "self", "summary": "SUSE Bug 1087260", "url": "https://bugzilla.suse.com/1087260" }, { "category": "self", "summary": "SUSE Bug 1087845", "url": "https://bugzilla.suse.com/1087845" }, { "category": "self", "summary": "SUSE Bug 1088241", "url": "https://bugzilla.suse.com/1088241" }, { "category": "self", "summary": "SUSE Bug 1088242", "url": "https://bugzilla.suse.com/1088242" }, { "category": "self", "summary": "SUSE Bug 1088600", "url": "https://bugzilla.suse.com/1088600" }, { "category": "self", "summary": "SUSE Bug 1088684", "url": "https://bugzilla.suse.com/1088684" }, { "category": "self", "summary": "SUSE Bug 1089198", "url": "https://bugzilla.suse.com/1089198" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18257 page", "url": "https://www.suse.com/security/cve/CVE-2017-18257/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1087 page", "url": "https://www.suse.com/security/cve/CVE-2018-1087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7740 page", "url": "https://www.suse.com/security/cve/CVE-2018-7740/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-18T12:44:34Z", "generator": { "date": "2018-10-18T12:44:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1173-2", "initial_release_date": "2018-10-18T12:44:34Z", "revision_history": [ { "date": "2018-10-18T12:44:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.73.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.73.1.noarch", "product_id": "kernel-devel-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.73.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.73.1.noarch", "product_id": "kernel-macros-4.4.121-92.73.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.73.1.noarch", "product": { "name": "kernel-source-4.4.121-92.73.1.noarch", "product_id": "kernel-source-4.4.121-92.73.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.73.1.x86_64", "product_id": "kernel-syms-4.4.121-92.73.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.73.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.73.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.73.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.73.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18257" } ], "notes": [ { "category": "general", "text": "The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18257", "url": "https://www.suse.com/security/cve/CVE-2017-18257" }, { "category": "external", "summary": "SUSE Bug 1088241 for CVE-2017-18257", "url": "https://bugzilla.suse.com/1088241" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2017-18257" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1087" } ], "notes": [ { "category": "general", "text": "kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1087", "url": "https://www.suse.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-1087", "url": "https://bugzilla.suse.com/1087088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "important" } ], "title": "CVE-2018-1087" }, { "cve": "CVE-2018-7740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7740" } ], "notes": [ { "category": "general", "text": "The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7740", "url": "https://www.suse.com/security/cve/CVE-2018-7740" }, { "category": "external", "summary": "SUSE Bug 1084353 for CVE-2018-7740", "url": "https://bugzilla.suse.com/1084353" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2018-7740" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.73.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.73.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_73-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:44:34Z", "details": "important" } ], "title": "CVE-2018-8897" } ] }
fkie_cve-2018-8897
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | Patch, Third Party Advisory | |
cve@mitre.org | http://openwall.com/lists/oss-security/2018/05/08/1 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://openwall.com/lists/oss-security/2018/05/08/4 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en | ||
cve@mitre.org | http://www.securityfocus.com/bid/104071 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040744 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040849 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040861 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040866 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1040882 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1318 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1319 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1345 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1346 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1347 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1348 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1349 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1350 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1351 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1352 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1353 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1354 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1355 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1524 | Third Party Advisory | |
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1567074 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://github.com/can1357/CVE-2018-8897/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | Patch, Third Party Advisory | |
cve@mitre.org | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html | Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html | Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html | ||
cve@mitre.org | https://patchwork.kernel.org/patch/10386677/ | Patch, Third Party Advisory | |
cve@mitre.org | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897 | Patch, Third Party Advisory, Vendor Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20180927-0002/ | ||
cve@mitre.org | https://support.apple.com/HT208742 | Third Party Advisory | |
cve@mitre.org | https://support.citrix.com/article/CTX234679 | Third Party Advisory | |
cve@mitre.org | https://svnweb.freebsd.org/base?view=revision&revision=333368 | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3641-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3641-2/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4196 | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2018/dsa-4201 | Third Party Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/44697/ | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.exploit-db.com/exploits/45024/ | ||
cve@mitre.org | https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc | Third Party Advisory | |
cve@mitre.org | https://www.kb.cert.org/vuls/id/631579 | ||
cve@mitre.org | https://www.synology.com/support/security/Synology_SA_18_21 | Third Party Advisory | |
cve@mitre.org | https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html | Third Party Advisory | |
cve@mitre.org | https://xenbits.xen.org/xsa/advisory-260.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2018/05/08/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2018/05/08/4 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104071 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040744 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040849 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040861 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040866 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040882 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1318 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1319 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1345 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1346 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1347 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1348 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1349 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1350 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1351 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1352 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1353 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1354 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1355 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1524 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1567074 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/can1357/CVE-2018-8897/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://patchwork.kernel.org/patch/10386677/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897 | Patch, Third Party Advisory, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180927-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208742 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX234679 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://svnweb.freebsd.org/base?view=revision&revision=333368 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3641-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3641-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4196 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4201 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/44697/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/45024/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/631579 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_21 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://xenbits.xen.org/xsa/advisory-260.html | Patch, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 17.10 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
redhat | enterprise_virtualization_manager | 3.0 | |
citrix | xenserver | 6.0.2 | |
citrix | xenserver | 6.2.0 | |
citrix | xenserver | 6.5 | |
citrix | xenserver | 7.0 | |
citrix | xenserver | 7.1 | |
citrix | xenserver | 7.2 | |
citrix | xenserver | 7.3 | |
citrix | xenserver | 7.4 | |
synology | skynas | - | |
synology | diskstation_manager | 5.2 | |
synology | diskstation_manager | 6.0 | |
synology | diskstation_manager | 6.1 | |
apple | mac_os_x | * | |
xen | xen | - | |
freebsd | freebsd | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "46DFC288-53F5-4D8E-BD2F-4E828735F915", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5FCF191B-971A-4945-AB14-08091689BE2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCEA97B9-A443-4F87-81B4-B3F0E94AC18E", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "56434D13-7A7B-495C-A135-2688C706A065", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "405F950F-0772-41A3-8B72-B67151CC1376", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5647AEA-DCE6-4950-A7EB-05465ECDDE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "68A35129-70B0-4EA9-A0A2-51AC277649D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "55FD399E-959A-4FB6-B049-AA73F0DFF9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "49422CA5-DF4B-4FE4-B408-81B637BE1287", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "01527614-8A68-48DC-B0A0-F4AA99489221", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "65372FA7-B54B-4298-99BF-483E9FEBA253", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "3D04EA1A-F8E0-415B-8786-1C8C0F08E132", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "D053772A-D0AE-474A-AE49-26A251C4B5D4", "versionEndExcluding": "10.13.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*", "matchCriteriaId": "BAB3DD44-8D3F-493C-936C-E0D6C63685C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "702C5136-33B6-4F0F-8FF7-C2BE3668DE70", "versionEndExcluding": "11.1", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs." }, { "lang": "es", "value": "Una declaraci\u00f3n en la gu\u00eda de programaci\u00f3n de sistemas del Manual del desarrollador de software (SDM) de las arquitecturas Intel 64 e IA-32 se manej\u00f3 incorrectamente en el desarrollo de algunos o todos los n\u00facleos del sistema operativo, lo que provoc\u00f3 un comportamiento inesperado para las excepciones #DB que son diferidas por MOV SS o POP SS, tal y como queda demostrado con (por ejemplo) el escalado de privilegios en Windows, macOS, algunas configuraciones Xen o FreeBSD, o un fallo del kernel de Linux. Las instrucciones de MOV a SS y POP SS inhiben interrupciones (incluyendo NMI), puntos de interrupci\u00f3n de datos y excepciones de trampas de un paso hasta los l\u00edmites de la instrucci\u00f3n que siguen a la siguiente instrucci\u00f3n (SDM Vol. 3A; secci\u00f3n 6.8.3). (Los puntos de interrupci\u00f3n de datos inhibidos son aquellos en la memoria a los que accede a la propia instrucci\u00f3n MOV a SS o POP a SS). Tenga en cuenta que las excepciones de depuraci\u00f3n no est\u00e1n inhibidas por el indicador del sistema de habilitaci\u00f3n de interrupciones (EFLAGS.IF) (SDM Vol. 3A; secci\u00f3n 2.3). Si la instrucci\u00f3n que sigue a la instrucci\u00f3n MOV a SS o POP a SS es una instrucci\u00f3n como SYSCALL, SYSENTER, INT 3, etc. que transfiere el control al sistema operativo a CPL \u003c 3, la excepci\u00f3n de depuraci\u00f3n se entrega despu\u00e9s de que la transferencia a CPL \u003c 3 se haya completado. Es posible que los kernels del sistema operativo no esperen este orden de eventos y, por lo tanto, puedan experimentar un comportamiento inesperado cuando ocurra." } ], "id": "CVE-2018-8897", "lastModified": "2024-11-21T04:14:33.140", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-08T18:29:00.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "source": "cve@mitre.org", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104071" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040744" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040849" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040861" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040866" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040882" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/can1357/CVE-2018-8897/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "source": "cve@mitre.org", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://patchwork.kernel.org/patch/10386677/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208742" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX234679" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44697/" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/45024/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "source": "cve@mitre.org", "url": "https://www.kb.cert.org/vuls/id/631579" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/can1357/CVE-2018-8897/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://patchwork.kernel.org/patch/10386677/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX234679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44697/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/45024/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/631579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://xenbits.xen.org/xsa/advisory-260.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2018:1348
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1348", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1348.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:08:11+00:00", "generator": { "date": "2025-08-02T08:08:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1348", "initial_release_date": "2018-05-08T21:57:33+00:00", "revision_history": [ { "date": "2018-05-08T21:57:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T06:31:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64", "product_id": "perf-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.48.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.48.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.src", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.src", "product_id": "kernel-0:3.10.0-514.48.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64", "product_id": "perf-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "perf-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "perf-0:3.10.0-514.48.3.el7.s390x", "product_id": "perf-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x", "product_id": "python-perf-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.48.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.48.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:57:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1348" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:57:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1348" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:57:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.3.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.3.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1347
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1347", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1347.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:08:18+00:00", "generator": { "date": "2025-08-02T08:08:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1347", "initial_release_date": "2018-05-08T21:39:48+00:00", "revision_history": [ { "date": "2018-05-08T21:39:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T06:29:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64", "product_id": "perf-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.66.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.66.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.66.3.el7.src", "product": { "name": "kernel-0:3.10.0-327.66.3.el7.src", "product_id": "kernel-0:3.10.0-327.66.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.66.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.66.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)", "product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)", "product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.66.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.66.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)", "product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:39:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1347" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:39:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1347" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:39:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.src", "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.3.el7.noarch", "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.3.el7.x86_64", "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1710
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the redhat-virtualization-host side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1710", "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1580328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580328" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1710.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host security update", "tracking": { "current_release_date": "2025-08-02T08:08:39+00:00", "generator": { "date": "2025-08-02T08:08:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1710", "initial_release_date": "2018-05-23T15:56:56+00:00", "revision_history": [ { "date": "2018-05-23T15:56:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-23T15:56:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H ELS", "product": { "name": "RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "product_id": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@3.6-20180521.0.el7_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "product": { "name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "product_id": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@3.6-20180521.0.el7_3?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src" }, "product_reference": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T15:56:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1710" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T15:56:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1710" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T15:56:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1710" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src", "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1349
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 10 May 2018]\n\nThe references to CVE-2017-5754 x86 (32-bit) mitigation were removed because Red Hat Enterprise Linux 6.4 Advanced Update Support does not include support for x86 32-bit architecture. Consequently, impact rating of this erratum was changed from Important to Moderate.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting this issue.\n\nBug Fix(es):\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554251)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1349", "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1349.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:17:29+00:00", "generator": { "date": "2025-08-02T05:17:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1349", "initial_release_date": "2018-05-08T21:49:08+00:00", "revision_history": [ { "date": "2018-05-08T21:49:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-10T18:14:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:17:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.88.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.88.2.el6.x86_64", "product_id": "perf-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.88.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.88.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.88.2.el6.src", "product": { "name": "kernel-0:2.6.32-358.88.2.el6.src", "product_id": "kernel-0:2.6.32-358.88.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.88.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.88.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.88.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.88.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.88.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.88.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.88.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src" }, "product_reference": "kernel-0:2.6.32-358.88.2.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.88.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.88.2.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.88.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src" }, "product_reference": "kernel-0:2.6.32-358.88.2.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.88.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.88.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:49:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1349" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1353
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1353", "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1353.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T05:17:50+00:00", "generator": { "date": "2025-08-02T05:17:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1353", "initial_release_date": "2018-05-08T22:49:06+00:00", "revision_history": [ { "date": "2018-05-08T22:49:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-08T22:49:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:17:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 5 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-431.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-431.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-431.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-0:2.6.18-431.el5.x86_64", "product_id": "kernel-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-431.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-431.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-431.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-431.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-431.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-431.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-431.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-431.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-431.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-431.el5.i686", "product_id": "kernel-xen-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-431.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-431.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-431.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-431.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-431.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-431.el5.i686", "product_id": "kernel-devel-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-431.el5.i686", "product": { "name": "kernel-0:2.6.18-431.el5.i686", "product_id": "kernel-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-431.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-431.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-431.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-431.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-431.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-431.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-431.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-431.el5.i686", "product_id": "kernel-PAE-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-431.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-431.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-431.el5.i686", "product_id": "kernel-debug-0:2.6.18-431.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-431.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-431.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-431.el5.i386", "product_id": "kernel-headers-0:2.6.18-431.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-431.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-431.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-431.el5.s390x", "product_id": "kernel-devel-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-0:2.6.18-431.el5.s390x", "product_id": "kernel-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-431.el5.s390x", "product_id": "kernel-headers-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-431.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-431.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-431.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-431.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-431.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-431.el5.s390x", "product_id": "kernel-debug-0:2.6.18-431.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-431.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-431.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-431.el5.noarch", "product_id": "kernel-doc-0:2.6.18-431.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-431.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-431.el5.src", "product": { "name": "kernel-0:2.6.18-431.el5.src", "product_id": "kernel-0:2.6.18-431.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-431.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-431.el5.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-431.el5.src" }, "product_reference": "kernel-0:2.6.18-431.el5.src", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-devel-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-431.el5.noarch as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-doc-0:2.6.18-431.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-431.el5.noarch", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-431.el5.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-431.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-431.el5.i386", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-431.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-devel-0:2.6.18-431.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-431.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-431.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-431.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-431.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-431.el5.x86_64", "relates_to_product_reference": "5Server-ELS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-ELS:kernel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-0:2.6.18-431.el5.src", "5Server-ELS:kernel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-431.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:49:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-ELS:kernel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-0:2.6.18-431.el5.src", "5Server-ELS:kernel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-431.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1353" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "5Server-ELS:kernel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-0:2.6.18-431.el5.src", "5Server-ELS:kernel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-431.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-431.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-431.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-431.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1346
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554253)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1346", "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1346.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:17:11+00:00", "generator": { "date": "2025-08-02T05:17:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1346", "initial_release_date": "2018-05-08T20:58:30+00:00", "revision_history": [ { "date": "2018-05-08T20:58:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-10T18:26:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:17:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.55.2.el6.x86_64", "product_id": "perf-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.55.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.55.2.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.55.2.el6.i686", "product_id": "python-perf-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.55.2.el6.i686", "product": { "name": "perf-0:2.6.32-573.55.2.el6.i686", "product_id": "perf-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.55.2.el6.i686", "product": { "name": "kernel-0:2.6.32-573.55.2.el6.i686", "product_id": "kernel-0:2.6.32-573.55.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.55.2.el6.src", "product": { "name": "kernel-0:2.6.32-573.55.2.el6.src", "product_id": "kernel-0:2.6.32-573.55.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.55.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.55.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.55.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.55.2.el6.s390x", "product_id": "python-perf-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "perf-0:2.6.32-573.55.2.el6.s390x", "product_id": "perf-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.55.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.55.2.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.55.2.el6.ppc64", "product_id": "perf-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.55.2.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T20:58:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1346" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T20:58:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1346" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T20:58:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1346" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1319
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1319", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "https://access.redhat.com/articles/3431591", "url": "https://access.redhat.com/articles/3431591" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1519160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160" }, { "category": "external", "summary": "1519591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "1531135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135" }, { "category": "external", "summary": "1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1319.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T17:05:26+00:00", "generator": { "date": "2025-08-03T17:05:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1319", "initial_release_date": "2018-05-08T19:04:35+00:00", "revision_history": [ { "date": "2018-05-08T19:04:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-10T18:43:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:05:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.i686", "product": { "name": "perf-0:2.6.32-696.28.1.el6.i686", "product_id": "perf-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686", "product_id": "python-perf-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64", "product_id": "perf-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.src", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.src", "product_id": "kernel-0:2.6.32-696.28.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.28.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.28.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.28.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x", "product_id": "python-perf-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "perf-0:2.6.32-696.28.1.el6.s390x", "product_id": "perf-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64", "product_id": "perf-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Mohamed Ghannam" ] } ], "cve": "CVE-2017-8824", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519591" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free vulnerability in DCCP socket", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "RHBZ#1519591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824" } ], "release_date": "2017-12-05T05:43:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use-after-free vulnerability in DCCP socket" }, { "cve": "CVE-2017-13166", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548412" } ], "notes": [ { "category": "description", "text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "RHBZ#1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166" } ], "release_date": "2017-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "category": "workaround", "details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation" }, { "cve": "CVE-2017-18017", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1531135" } ], "notes": [ { "category": "description", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "RHBZ#1531135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017" } ], "release_date": "2018-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c" }, { "acknowledgments": [ { "names": [ "Armis Labs" ] } ], "cve": "CVE-2017-1000410", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519160" } ], "notes": [ { "category": "description", "text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack information leak in the EFS element", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000410" }, { "category": "external", "summary": "RHBZ#1519160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410" } ], "release_date": "2017-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Stack information leak in the EFS element" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1354
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897 and Andy Lutomirski for reporting CVE-2018-1000199.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1354", "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1354.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2025-08-02T08:08:23+00:00", "generator": { "date": "2025-08-02T08:08:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1354", "initial_release_date": "2018-05-08T22:26:29+00:00", "revision_history": [ { "date": "2018-05-08T22:26:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-08T22:26:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.25.4.rt56.613.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.25.4.rt56.613.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.25.4.rt56.613.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.25.4.rt56.613.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:26:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1354" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:26:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.4.rt56.613.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.4.rt56.613.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1355
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939)\n\n* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.2.3 source tree, which provides a number of bug fixes over the previous version. (BZ#1549768)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1355", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "1549768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549768" }, { "category": "external", "summary": "1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1355.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T08:08:01+00:00", "generator": { "date": "2025-08-02T08:08:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1355", "initial_release_date": "2018-05-08T22:24:51+00:00", "revision_history": [ { "date": "2018-05-08T22:24:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-08T22:24:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.2.3.rt56.806.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.2.3.rt56.806.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "product": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "product_id": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.2.3.rt56.806.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16939", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1517220" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulerable to a use-after-free flaw when Transformation User configuration interface(CONFIG_XFRM_USER) compile-time configuration were enabled. This vulnerability occurs while closing a xfrm netlink socket in xfrm_dump_policy_done. A user/process could abuse this flaw to potentially escalate their privileges on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16939" }, { "category": "external", "summary": "RHBZ#1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16939", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939" } ], "release_date": "2017-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation" }, { "cve": "CVE-2018-1068", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552048" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "RHBZ#1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068" } ], "release_date": "2018-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.src", "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.2.3.rt56.806.el7.noarch", "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.2.3.rt56.806.el7.x86_64", "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.2.3.rt56.806.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1352
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1352", "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1352.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T05:17:57+00:00", "generator": { "date": "2025-08-02T05:17:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1352", "initial_release_date": "2018-05-08T22:48:55+00:00", "revision_history": [ { "date": "2018-05-08T22:48:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-08T22:48:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:17:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:5.9" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.39.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.39.2.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.39.2.el5.src", "product": { "name": "kernel-0:2.6.18-348.39.2.el5.src", "product_id": "kernel-0:2.6.18-348.39.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.2.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-xen-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-devel-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-PAE-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.39.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.39.2.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-348.39.2.el5.i686", "product_id": "kernel-debug-0:2.6.18-348.39.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.39.2.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.39.2.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-348.39.2.el5.i386", "product_id": "kernel-headers-0:2.6.18-348.39.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.39.2.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-348.39.2.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-348.39.2.el5.noarch", "product_id": "kernel-doc-0:2.6.18-348.39.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.39.2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.39.2.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.src" }, "product_reference": "kernel-0:2.6.18-348.39.2.el5.src", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-348.39.2.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.2.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-348.39.2.el5.noarch", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.39.2.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-348.39.2.el5.i386", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.39.2.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.2.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T22:48:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.2.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.39.2.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.39.2.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.39.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1318
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939)\n\n* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\n* kernel: guest kernel crash during core dump on POWER9 host (CVE-2018-1091)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431641", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1318", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "https://access.redhat.com/articles/3431641", "url": "https://access.redhat.com/articles/3431641" }, { "category": "external", "summary": "1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "1558149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558149" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1318.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-02T08:06:59+00:00", "generator": { "date": "2025-08-02T08:06:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1318", "initial_release_date": "2018-05-08T18:32:03+00:00", "revision_history": [ { "date": "2018-05-08T18:32:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T17:35:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:06:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64", "product_id": "perf-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.2.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.2.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.2.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.2.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.src", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.src", "product_id": "kernel-0:3.10.0-862.2.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x", "product_id": "python-perf-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "perf-0:3.10.0-862.2.3.el7.s390x", "product_id": "perf-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.2.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64", "product_id": "perf-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.2.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "perf-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.2.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.2.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-Alt-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.src", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-862.2.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-862.2.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.5.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16939", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1517220" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulerable to a use-after-free flaw when Transformation User configuration interface(CONFIG_XFRM_USER) compile-time configuration were enabled. This vulnerability occurs while closing a xfrm netlink socket in xfrm_dump_policy_done. A user/process could abuse this flaw to potentially escalate their privileges on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16939" }, { "category": "external", "summary": "RHBZ#1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16939", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939" } ], "release_date": "2017-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation" }, { "cve": "CVE-2018-1068", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552048" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "RHBZ#1552048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068" } ], "release_date": "2018-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "cve": "CVE-2018-1091", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2018-02-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558149" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel where a crash can be triggered from unprivileged userspace during core dump on a POWER system with a certain configuration. This is due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: guest kernel crash during core dump on POWER9 host", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1091" }, { "category": "external", "summary": "RHBZ#1558149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1091", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1091" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1091", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1091" } ], "release_date": "2017-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: guest kernel crash during core dump on POWER9 host" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T18:32:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Client-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.src", "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.2.3.el7.noarch", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.2.3.el7.x86_64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.ppc64le", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.s390x", "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.2.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1350
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 10 May 2018]\n\nThe references to CVE-2017-5754 x86 (32-bit) mitigation were removed because Red Hat Enterprise Linux 6.5 Advanced Update Support does not include support for x86 32-bit architecture. Consequently, impact rating of this erratum was changed from Important to Moderate.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting this issue.\n\nBug Fix(es):\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554256)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1350", "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1350.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:17:05+00:00", "generator": { "date": "2025-08-02T05:17:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1350", "initial_release_date": "2018-05-08T21:51:44+00:00", "revision_history": [ { "date": "2018-05-08T21:51:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-10T18:14:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:17:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.89.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.89.2.el6.x86_64", "product_id": "perf-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.89.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.89.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.89.2.el6.src", "product": { "name": "kernel-0:2.6.32-431.89.2.el6.src", "product_id": "kernel-0:2.6.32-431.89.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.89.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.89.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.89.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.89.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.89.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.89.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.89.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.89.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.89.2.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.89.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.89.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.89.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.89.2.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.89.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.89.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:51:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1350" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1524
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated redhat-virtualization-host packages that fix several bugs and add various enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nIncludes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897.\n\nA list of bugs fixed in this update is available in the Technical Notes book: https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/technical_notes/", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1524", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1357247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357247" }, { "category": "external", "summary": "1374007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374007" }, { "category": "external", "summary": "1420068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420068" }, { "category": "external", "summary": "1422676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422676" }, { "category": "external", "summary": "1429485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429485" }, { "category": "external", "summary": "1433394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433394" }, { "category": "external", "summary": "1443965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443965" }, { "category": "external", "summary": "1454536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1454536" }, { "category": "external", "summary": "1474268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474268" }, { "category": "external", "summary": "1489567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489567" }, { "category": "external", "summary": "1501161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501161" }, { "category": "external", "summary": "1502920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502920" }, { "category": "external", "summary": "1503148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503148" }, { "category": "external", "summary": "1516123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516123" }, { "category": "external", "summary": "1534855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534855" }, { "category": "external", "summary": "1535791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535791" }, { "category": "external", "summary": "1542833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542833" }, { "category": "external", "summary": "1547864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547864" }, { "category": "external", "summary": "1549630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549630" }, { "category": "external", "summary": "1554186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554186" }, { "category": "external", "summary": "1555243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555243" }, { "category": "external", "summary": "1555254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555254" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "1561258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561258" }, { "category": "external", "summary": "1563530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563530" }, { "category": "external", "summary": "1565497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565497" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "1571134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571134" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1524.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-02T08:07:53+00:00", "generator": { "date": "2025-08-02T08:07:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1524", "initial_release_date": "2018-05-15T17:40:52+00:00", "revision_history": [ { "date": "2018-05-15T17:40:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-15T17:40:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:07:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_id": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.2.0-0.20170814.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180508.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_id": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng@4.2.0-0.20170814.0.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product_id": "imgbased-0:1.0.16-0.1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180508.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src" }, "product_reference": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch" }, "product_reference": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm" ], "organization": "Google Security Team" } ], "cve": "CVE-2018-1111", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2018-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567974" } ], "notes": [ { "category": "description", "text": "A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Red Hat Enterprise Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has been made aware of a vulnerability affecting the DHCP client packages as shipped with Red Hat Enterprise Linux 6 and 7. This vulnerability CVE-2018-1111 was rated as having a security impact of Critical. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.\n\nRed Hat Enterprise Virtualization 4.1 includes the vulnerable components, but the default configuration is not impacted because NetworkManager is turned off in the Management Appliance, and not used in conjunction with DHCP in the Hypervisor. Customers can still obtain the updated packages from Red Hat Enterprise Linux channels using `yum update`, or upgrade to Red Hat Enterprise Virtualization 4.2, which includes the fixed packages.\n\nRed Hat Enterprise Virtualization 3.6 is not vulnerable as it does not use DHCP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1111" }, { "category": "external", "summary": "RHBZ#1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1111", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3442151", "url": "https://access.redhat.com/security/vulnerabilities/3442151" } ], "release_date": "2018-05-15T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "Please access https://access.redhat.com/security/vulnerabilities/3442151 for information on how to mitigate this issue.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1351
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 10 May 2018]\n\nThe references to CVE-2017-5754 x86 (32-bit) mitigation were removed because Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support do not include support for x86 32-bit architecture. Consequently, impact rating of this erratum was changed from Important to Moderate.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting this issue.\n\nBug Fix(es):\n\n* If an NFSv3 client mounted a subdirectory of an exported file system, a directory entry to the mount hosting the export was incorrectly held even after clearing the cache. Consequently, attempts to unmount the subdirectory with the umount command failed with the EBUSY error. With this update, the underlying source code has been fixed, and the unmount operation now succeeds as expected in the described situation. (BZ#1538588)\n\n* The kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Retpolines. The Retpolines mechanism is a software construct that leverages specific knowledge of the underlying hardware to mitigate the branch target injection, also known as Spectre variant 2 vulnerability described in CVE-2017-5715. (BZ#1554254)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1351", "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1351.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T05:17:18+00:00", "generator": { "date": "2025-08-02T05:17:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1351", "initial_release_date": "2018-05-08T21:52:05+00:00", "revision_history": [ { "date": "2018-05-08T21:52:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-10T18:16:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T05:17:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.68.2.el6.x86_64", "product_id": "perf-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.68.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.68.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.68.2.el6.x86_64", "product_id": "kernel-0:2.6.32-504.68.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.68.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.68.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.68.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.68.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.68.2.el6.src", "product": { "name": "kernel-0:2.6.32-504.68.2.el6.src", "product_id": "kernel-0:2.6.32-504.68.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.68.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.src", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.src", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.src", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T21:52:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1351" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.68.2.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.68.2.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.68.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018:1345
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1345", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1345.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T08:07:12+00:00", "generator": { "date": "2025-08-02T08:07:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1345", "initial_release_date": "2018-05-08T19:53:11+00:00", "revision_history": [ { "date": "2018-05-08T19:53:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-09T06:14:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:07:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x", "product_id": "python-perf-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "perf-0:3.10.0-693.25.4.el7.s390x", "product_id": "perf-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.25.4.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64", "product_id": "perf-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64", "product_id": "perf-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.25.4.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.4.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "perf-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.4.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.25.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.25.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.25.4.el7.src", "product": { "name": "kernel-0:3.10.0-693.25.4.el7.src", "product_id": "kernel-0:3.10.0-693.25.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)", "product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)", "product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)", "product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.src", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.25.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.25.4.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)", "product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:53:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:53:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1345" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1000199", "cwe": { "id": "CWE-460", "name": "Improper Cleanup on Thrown Exception" }, "discovery_date": "2018-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1568477" } ], "notes": [ { "category": "description", "text": "An address corruption flaw was discovered in the Linux kernel built with hardware breakpoint (CONFIG_HAVE_HW_BREAKPOINT) support. While modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an unprivileged user/process could use this flaw to crash the system kernel resulting in DoS OR to potentially escalate privileges on a the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ptrace() incorrect error handling leads to corruption and DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "RHBZ#1568477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568477" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000199", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000199" } ], "release_date": "2018-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:53:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "category": "workaround", "details": "To mitigate this issue:\n1) Save the following script in a \u0027CVE-2018-1000199.stp\u0027 file.\n---\nprobe kernel.function(\"ptrace_set_debugreg\") {\n if ($n \u003c 4)\n $n = 4; /* set invalid debug register #, returns -EIO */\n}\nprobe begin {\n printk(0, \"CVE-2018-1000199 mitigation loaded\")\n}\nprobe end {\n printk(0, \"CVE-2018-1000199 mitigation unloaded\")\n}\n---\n2) Install systemtap package and its dependencies\n # yum install -y systemtap systemtap-runtime\n # yum install -y kernel-devel kernel-debuginfo kernel-debuginfo-common\n\n3) Build the mitigation kernel module as root.\n # stap -r `uname -r` -m cve_2018_1000199.ko -g CVE-2018-1000199.stp -p4\n\n4) Load the mitigation module as root\n # staprun -L cve_2018_1000199.ko", "product_ids": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.src", "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.4.el7.noarch", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.4.el7.x86_64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.ppc64le", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.s390x", "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ptrace() incorrect error handling leads to corruption and DoS" } ] }
rhsa-2018:1711
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the rhev-hypervisor7 side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1711", "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1711.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor7 security update", "tracking": { "current_release_date": "2025-08-02T08:08:33+00:00", "generator": { "date": "2025-08-02T08:08:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1711", "initial_release_date": "2018-05-23T16:00:52+00:00", "revision_history": [ { "date": "2018-05-23T16:00:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-23T16:00:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T08:08:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6 ELS", "product": { "name": "RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } }, { "category": "product_name", "name": "RHEL 7-based RHEV-H ELS", "product": { "name": "RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el6ev?arch=src" } } }, { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el7ev?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "product": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "product_id": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el7ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src as a component of RHEV Hypervisor for RHEL-6 ELS", "product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" }, { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src as a component of RHEL 7-based RHEV-H ELS", "product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" }, "product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T16:00:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1711" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T16:00:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1711" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-23T16:00:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1711" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch", "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch", "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
ghsa-j2cv-h77g-5p95
Vulnerability from github
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
{ "affected": [], "aliases": [ "CVE-2018-8897" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-08T18:29:00Z", "severity": "HIGH" }, "details": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "id": "GHSA-j2cv-h77g-5p95", "modified": "2022-05-13T01:53:48Z", "published": "2022-05-13T01:53:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "type": "WEB", "url": "https://patchwork.kernel.org/patch/10386677" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20180927-0002" }, { "type": "WEB", "url": "https://support.apple.com/HT208742" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX234679" }, { "type": "WEB", "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3641-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3641-2" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4196" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4201" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/44697" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/45024" }, { "type": "WEB", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/631579" }, { "type": "WEB", "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "type": "WEB", "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "type": "WEB", "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "type": "WEB", "url": "https://github.com/can1357/CVE-2018-8897" }, { "type": "WEB", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "type": "WEB", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104071" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040744" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040849" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040861" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040866" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040882" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
opensuse-su-2024:11520-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "xen-4.15.1_01-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11520", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11520-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1320 page", "url": "https://www.suse.com/security/cve/CVE-2007-1320/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-1366 page", "url": "https://www.suse.com/security/cve/CVE-2007-1366/" }, { "category": "self", "summary": "SUSE CVE CVE-2007-3919 page", "url": "https://www.suse.com/security/cve/CVE-2007-3919/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10013 page", "url": "https://www.suse.com/security/cve/CVE-2016-10013/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10024 page", "url": "https://www.suse.com/security/cve/CVE-2016-10024/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10025 page", "url": "https://www.suse.com/security/cve/CVE-2016-10025/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7777 page", "url": "https://www.suse.com/security/cve/CVE-2016-7777/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7908 page", "url": "https://www.suse.com/security/cve/CVE-2016-7908/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7909 page", "url": "https://www.suse.com/security/cve/CVE-2016-7909/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8667 page", "url": "https://www.suse.com/security/cve/CVE-2016-8667/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8669 page", "url": "https://www.suse.com/security/cve/CVE-2016-8669/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8910 page", "url": "https://www.suse.com/security/cve/CVE-2016-8910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9377 page", "url": "https://www.suse.com/security/cve/CVE-2016-9377/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9379 page", "url": "https://www.suse.com/security/cve/CVE-2016-9379/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9381 page", "url": "https://www.suse.com/security/cve/CVE-2016-9381/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9382 page", "url": "https://www.suse.com/security/cve/CVE-2016-9382/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9383 page", "url": "https://www.suse.com/security/cve/CVE-2016-9383/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9384 page", "url": "https://www.suse.com/security/cve/CVE-2016-9384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9385 page", "url": "https://www.suse.com/security/cve/CVE-2016-9385/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9386 page", "url": "https://www.suse.com/security/cve/CVE-2016-9386/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9637 page", "url": "https://www.suse.com/security/cve/CVE-2016-9637/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9921 page", "url": "https://www.suse.com/security/cve/CVE-2016-9921/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9932 page", "url": "https://www.suse.com/security/cve/CVE-2016-9932/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12135 page", "url": "https://www.suse.com/security/cve/CVE-2017-12135/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12136 page", "url": "https://www.suse.com/security/cve/CVE-2017-12136/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12137 page", "url": "https://www.suse.com/security/cve/CVE-2017-12137/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2615 page", "url": "https://www.suse.com/security/cve/CVE-2017-2615/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2620 page", "url": "https://www.suse.com/security/cve/CVE-2017-2620/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6505 page", "url": "https://www.suse.com/security/cve/CVE-2017-6505/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8309 page", "url": "https://www.suse.com/security/cve/CVE-2017-8309/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9330 page", "url": "https://www.suse.com/security/cve/CVE-2017-9330/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10471 page", "url": "https://www.suse.com/security/cve/CVE-2018-10471/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10472 page", "url": "https://www.suse.com/security/cve/CVE-2018-10472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10981 page", "url": "https://www.suse.com/security/cve/CVE-2018-10981/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10982 page", "url": "https://www.suse.com/security/cve/CVE-2018-10982/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12891 page", "url": "https://www.suse.com/security/cve/CVE-2018-12891/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12892 page", "url": "https://www.suse.com/security/cve/CVE-2018-12892/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12893 page", "url": "https://www.suse.com/security/cve/CVE-2018-12893/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15468 page", "url": "https://www.suse.com/security/cve/CVE-2018-15468/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15469 page", "url": "https://www.suse.com/security/cve/CVE-2018-15469/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15470 page", "url": "https://www.suse.com/security/cve/CVE-2018-15470/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18883 page", "url": "https://www.suse.com/security/cve/CVE-2018-18883/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19961 page", "url": "https://www.suse.com/security/cve/CVE-2018-19961/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19963 page", "url": "https://www.suse.com/security/cve/CVE-2018-19963/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19964 page", "url": "https://www.suse.com/security/cve/CVE-2018-19964/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19965 page", "url": "https://www.suse.com/security/cve/CVE-2018-19965/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19966 page", "url": "https://www.suse.com/security/cve/CVE-2018-19966/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19967 page", "url": "https://www.suse.com/security/cve/CVE-2018-19967/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5244 page", "url": "https://www.suse.com/security/cve/CVE-2018-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7540 page", "url": "https://www.suse.com/security/cve/CVE-2018-7540/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7541 page", "url": "https://www.suse.com/security/cve/CVE-2018-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7542 page", "url": "https://www.suse.com/security/cve/CVE-2018-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8897 page", "url": "https://www.suse.com/security/cve/CVE-2018-8897/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17349 page", "url": "https://www.suse.com/security/cve/CVE-2019-17349/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11739 page", "url": "https://www.suse.com/security/cve/CVE-2020-11739/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11740 page", "url": "https://www.suse.com/security/cve/CVE-2020-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11742 page", "url": "https://www.suse.com/security/cve/CVE-2020-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11743 page", "url": "https://www.suse.com/security/cve/CVE-2020-11743/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15563 page", "url": "https://www.suse.com/security/cve/CVE-2020-15563/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15565 page", "url": "https://www.suse.com/security/cve/CVE-2020-15565/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15566 page", "url": "https://www.suse.com/security/cve/CVE-2020-15566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15567 page", "url": "https://www.suse.com/security/cve/CVE-2020-15567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25595 page", "url": "https://www.suse.com/security/cve/CVE-2020-25595/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25596 page", "url": "https://www.suse.com/security/cve/CVE-2020-25596/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25597 page", "url": "https://www.suse.com/security/cve/CVE-2020-25597/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25598 page", "url": "https://www.suse.com/security/cve/CVE-2020-25598/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25599 page", "url": "https://www.suse.com/security/cve/CVE-2020-25599/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25600 page", "url": "https://www.suse.com/security/cve/CVE-2020-25600/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25601 page", "url": "https://www.suse.com/security/cve/CVE-2020-25601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25602 page", "url": "https://www.suse.com/security/cve/CVE-2020-25602/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25603 page", "url": "https://www.suse.com/security/cve/CVE-2020-25603/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25604 page", "url": "https://www.suse.com/security/cve/CVE-2020-25604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27670 page", "url": "https://www.suse.com/security/cve/CVE-2020-27670/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27671 page", "url": "https://www.suse.com/security/cve/CVE-2020-27671/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27672 page", "url": "https://www.suse.com/security/cve/CVE-2020-27672/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27674 page", "url": "https://www.suse.com/security/cve/CVE-2020-27674/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28368 page", "url": "https://www.suse.com/security/cve/CVE-2020-28368/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29040 page", "url": "https://www.suse.com/security/cve/CVE-2020-29040/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29480 page", "url": "https://www.suse.com/security/cve/CVE-2020-29480/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29481 page", "url": "https://www.suse.com/security/cve/CVE-2020-29481/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29483 page", "url": "https://www.suse.com/security/cve/CVE-2020-29483/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29484 page", "url": "https://www.suse.com/security/cve/CVE-2020-29484/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29566 page", "url": "https://www.suse.com/security/cve/CVE-2020-29566/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29567 page", "url": "https://www.suse.com/security/cve/CVE-2020-29567/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29570 page", "url": "https://www.suse.com/security/cve/CVE-2020-29570/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29571 page", "url": "https://www.suse.com/security/cve/CVE-2020-29571/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28687 page", "url": "https://www.suse.com/security/cve/CVE-2021-28687/" } ], "title": "xen-4.15.1_01-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11520-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.aarch64", "product": { "name": "xen-4.15.1_01-1.2.aarch64", "product_id": "xen-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.aarch64", "product": { "name": "xen-devel-4.15.1_01-1.2.aarch64", "product_id": "xen-devel-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.aarch64", "product": { "name": "xen-doc-html-4.15.1_01-1.2.aarch64", "product_id": "xen-doc-html-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.aarch64", "product": { "name": "xen-libs-4.15.1_01-1.2.aarch64", "product_id": "xen-libs-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "product_id": "xen-libs-32bit-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-domU-4.15.1_01-1.2.aarch64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-4.15.1_01-1.2.ppc64le", "product_id": "xen-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-devel-4.15.1_01-1.2.ppc64le", "product_id": "xen-devel-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-doc-html-4.15.1_01-1.2.ppc64le", "product_id": "xen-doc-html-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-libs-4.15.1_01-1.2.ppc64le", "product_id": "xen-libs-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "product_id": "xen-libs-32bit-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-domU-4.15.1_01-1.2.ppc64le" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.s390x", "product": { "name": "xen-4.15.1_01-1.2.s390x", "product_id": "xen-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.s390x", "product": { "name": "xen-devel-4.15.1_01-1.2.s390x", "product_id": "xen-devel-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.s390x", "product": { "name": "xen-doc-html-4.15.1_01-1.2.s390x", "product_id": "xen-doc-html-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.s390x", "product": { "name": "xen-libs-4.15.1_01-1.2.s390x", "product_id": "xen-libs-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.s390x", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.s390x", "product_id": "xen-libs-32bit-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-4.15.1_01-1.2.s390x", "product_id": "xen-tools-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.s390x", "product_id": "xen-tools-domU-4.15.1_01-1.2.s390x" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xen-4.15.1_01-1.2.x86_64", "product": { "name": "xen-4.15.1_01-1.2.x86_64", "product_id": "xen-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-devel-4.15.1_01-1.2.x86_64", "product": { "name": "xen-devel-4.15.1_01-1.2.x86_64", "product_id": "xen-devel-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-doc-html-4.15.1_01-1.2.x86_64", "product": { "name": "xen-doc-html-4.15.1_01-1.2.x86_64", "product_id": "xen-doc-html-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-4.15.1_01-1.2.x86_64", "product": { "name": "xen-libs-4.15.1_01-1.2.x86_64", "product_id": "xen-libs-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "product": { "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "product_id": "xen-libs-32bit-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-domU-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-domU-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-domU-4.15.1_01-1.2.x86_64" } }, { "category": "product_version", "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "product": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x" }, "product_reference": "xen-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-devel-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-devel-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x" }, "product_reference": "xen-devel-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-devel-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-devel-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-doc-html-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-doc-html-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-libs-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-libs-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x" }, "product_reference": "xen-libs-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-libs-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-libs-32bit-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-libs-32bit-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-domU-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-domU-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" }, "product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-1320", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1320" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to \"attempting to mark non-existent regions as dirty,\" aka the \"bitblt\" heap overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1320", "url": "https://www.suse.com/security/cve/CVE-2007-1320" }, { "category": "external", "summary": "SUSE Bug 252519 for CVE-2007-1320", "url": "https://bugzilla.suse.com/252519" }, { "category": "external", "summary": "SUSE Bug 270621 for CVE-2007-1320", "url": "https://bugzilla.suse.com/270621" }, { "category": "external", "summary": "SUSE Bug 435135 for CVE-2007-1320", "url": "https://bugzilla.suse.com/435135" }, { "category": "external", "summary": "SUSE Bug 448551 for CVE-2007-1320", "url": "https://bugzilla.suse.com/448551" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2007-1320" }, { "cve": "CVE-2007-1366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-1366" } ], "notes": [ { "category": "general", "text": "QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by \"aam 0x0,\" which triggers a divide-by-zero error.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-1366", "url": "https://www.suse.com/security/cve/CVE-2007-1366" }, { "category": "external", "summary": "SUSE Bug 252519 for CVE-2007-1366", "url": "https://bugzilla.suse.com/252519" }, { "category": "external", "summary": "SUSE Bug 270621 for CVE-2007-1366", "url": "https://bugzilla.suse.com/270621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2007-1366" }, { "cve": "CVE-2007-3919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2007-3919" } ], "notes": [ { "category": "general", "text": "(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2007-3919", "url": "https://www.suse.com/security/cve/CVE-2007-3919" }, { "category": "external", "summary": "SUSE Bug 334445 for CVE-2007-3919", "url": "https://bugzilla.suse.com/334445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2007-3919" }, { "cve": "CVE-2016-10013", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10013" } ], "notes": [ { "category": "general", "text": "Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10013", "url": "https://www.suse.com/security/cve/CVE-2016-10013" }, { "category": "external", "summary": "SUSE Bug 1016340 for CVE-2016-10013", "url": "https://bugzilla.suse.com/1016340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10013" }, { "cve": "CVE-2016-10024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10024" } ], "notes": [ { "category": "general", "text": "Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10024", "url": "https://www.suse.com/security/cve/CVE-2016-10024" }, { "category": "external", "summary": "SUSE Bug 1014298 for CVE-2016-10024", "url": "https://bugzilla.suse.com/1014298" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2016-10024", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10024" }, { "cve": "CVE-2016-10025", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10025" } ], "notes": [ { "category": "general", "text": "VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10025", "url": "https://www.suse.com/security/cve/CVE-2016-10025" }, { "category": "external", "summary": "SUSE Bug 1014300 for CVE-2016-10025", "url": "https://bugzilla.suse.com/1014300" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10025" }, { "cve": "CVE-2016-7777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7777" } ], "notes": [ { "category": "general", "text": "Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7777", "url": "https://www.suse.com/security/cve/CVE-2016-7777" }, { "category": "external", "summary": "SUSE Bug 1000106 for CVE-2016-7777", "url": "https://bugzilla.suse.com/1000106" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7777" }, { "cve": "CVE-2016-7908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7908" } ], "notes": [ { "category": "general", "text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7908", "url": "https://www.suse.com/security/cve/CVE-2016-7908" }, { "category": "external", "summary": "SUSE Bug 1002550 for CVE-2016-7908", "url": "https://bugzilla.suse.com/1002550" }, { "category": "external", "summary": "SUSE Bug 1003030 for CVE-2016-7908", "url": "https://bugzilla.suse.com/1003030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7908" }, { "cve": "CVE-2016-7909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7909" } ], "notes": [ { "category": "general", "text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7909", "url": "https://www.suse.com/security/cve/CVE-2016-7909" }, { "category": "external", "summary": "SUSE Bug 1002557 for CVE-2016-7909", "url": "https://bugzilla.suse.com/1002557" }, { "category": "external", "summary": "SUSE Bug 1003032 for CVE-2016-7909", "url": "https://bugzilla.suse.com/1003032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7909" }, { "cve": "CVE-2016-8667", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8667" } ], "notes": [ { "category": "general", "text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8667", "url": "https://www.suse.com/security/cve/CVE-2016-8667" }, { "category": "external", "summary": "SUSE Bug 1004702 for CVE-2016-8667", "url": "https://bugzilla.suse.com/1004702" }, { "category": "external", "summary": "SUSE Bug 1005004 for CVE-2016-8667", "url": "https://bugzilla.suse.com/1005004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8667" }, { "cve": "CVE-2016-8669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8669" } ], "notes": [ { "category": "general", "text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8669", "url": "https://www.suse.com/security/cve/CVE-2016-8669" }, { "category": "external", "summary": "SUSE Bug 1004707 for CVE-2016-8669", "url": "https://bugzilla.suse.com/1004707" }, { "category": "external", "summary": "SUSE Bug 1005005 for CVE-2016-8669", "url": "https://bugzilla.suse.com/1005005" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-8669" }, { "cve": "CVE-2016-8910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8910" } ], "notes": [ { "category": "general", "text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8910", "url": "https://www.suse.com/security/cve/CVE-2016-8910" }, { "category": "external", "summary": "SUSE Bug 1006538 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1006538" }, { "category": "external", "summary": "SUSE Bug 1007157 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1007157" }, { "category": "external", "summary": "SUSE Bug 1024178 for CVE-2016-8910", "url": "https://bugzilla.suse.com/1024178" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-8910" }, { "cve": "CVE-2016-9377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9377" } ], "notes": [ { "category": "general", "text": "Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9377", "url": "https://www.suse.com/security/cve/CVE-2016-9377" }, { "category": "external", "summary": "SUSE Bug 1009108 for CVE-2016-9377", "url": "https://bugzilla.suse.com/1009108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9377" }, { "cve": "CVE-2016-9379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9379" } ], "notes": [ { "category": "general", "text": "The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9379", "url": "https://www.suse.com/security/cve/CVE-2016-9379" }, { "category": "external", "summary": "SUSE Bug 1009111 for CVE-2016-9379", "url": "https://bugzilla.suse.com/1009111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9379" }, { "cve": "CVE-2016-9381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9381" } ], "notes": [ { "category": "general", "text": "Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9381", "url": "https://www.suse.com/security/cve/CVE-2016-9381" }, { "category": "external", "summary": "SUSE Bug 1009109 for CVE-2016-9381", "url": "https://bugzilla.suse.com/1009109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9381" }, { "cve": "CVE-2016-9382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9382" } ], "notes": [ { "category": "general", "text": "Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9382", "url": "https://www.suse.com/security/cve/CVE-2016-9382" }, { "category": "external", "summary": "SUSE Bug 1009103 for CVE-2016-9382", "url": "https://bugzilla.suse.com/1009103" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9382" }, { "cve": "CVE-2016-9383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9383" } ], "notes": [ { "category": "general", "text": "Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9383", "url": "https://www.suse.com/security/cve/CVE-2016-9383" }, { "category": "external", "summary": "SUSE Bug 1009107 for CVE-2016-9383", "url": "https://bugzilla.suse.com/1009107" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9383" }, { "cve": "CVE-2016-9384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9384" } ], "notes": [ { "category": "general", "text": "Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9384", "url": "https://www.suse.com/security/cve/CVE-2016-9384" }, { "category": "external", "summary": "SUSE Bug 1009105 for CVE-2016-9384", "url": "https://bugzilla.suse.com/1009105" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9384" }, { "cve": "CVE-2016-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9385" } ], "notes": [ { "category": "general", "text": "The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9385", "url": "https://www.suse.com/security/cve/CVE-2016-9385" }, { "category": "external", "summary": "SUSE Bug 1009104 for CVE-2016-9385", "url": "https://bugzilla.suse.com/1009104" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9385" }, { "cve": "CVE-2016-9386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9386" } ], "notes": [ { "category": "general", "text": "The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving \"unexpected\" base/limit values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9386", "url": "https://www.suse.com/security/cve/CVE-2016-9386" }, { "category": "external", "summary": "SUSE Bug 1009100 for CVE-2016-9386", "url": "https://bugzilla.suse.com/1009100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9386" }, { "cve": "CVE-2016-9637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9637" } ], "notes": [ { "category": "general", "text": "The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9637", "url": "https://www.suse.com/security/cve/CVE-2016-9637" }, { "category": "external", "summary": "SUSE Bug 1011652 for CVE-2016-9637", "url": "https://bugzilla.suse.com/1011652" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9637" }, { "cve": "CVE-2016-9921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9921" } ], "notes": [ { "category": "general", "text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9921", "url": "https://www.suse.com/security/cve/CVE-2016-9921" }, { "category": "external", "summary": "SUSE Bug 1014702 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1014702" }, { "category": "external", "summary": "SUSE Bug 1015169 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1015169" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2016-9921", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9921" }, { "cve": "CVE-2016-9932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9932" } ], "notes": [ { "category": "general", "text": "CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a \"supposedly-ignored\" operand size prefix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9932", "url": "https://www.suse.com/security/cve/CVE-2016-9932" }, { "category": "external", "summary": "SUSE Bug 1012651 for CVE-2016-9932", "url": "https://bugzilla.suse.com/1012651" }, { "category": "external", "summary": "SUSE Bug 1016340 for CVE-2016-9932", "url": "https://bugzilla.suse.com/1016340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-9932" }, { "cve": "CVE-2017-12135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12135" } ], "notes": [ { "category": "general", "text": "Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12135", "url": "https://www.suse.com/security/cve/CVE-2017-12135" }, { "category": "external", "summary": "SUSE Bug 1051787 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1051787" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-12135", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12135" }, { "cve": "CVE-2017-12136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12136" } ], "notes": [ { "category": "general", "text": "Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12136", "url": "https://www.suse.com/security/cve/CVE-2017-12136" }, { "category": "external", "summary": "SUSE Bug 1051789 for CVE-2017-12136", "url": "https://bugzilla.suse.com/1051789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12136" }, { "cve": "CVE-2017-12137", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12137" } ], "notes": [ { "category": "general", "text": "arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12137", "url": "https://www.suse.com/security/cve/CVE-2017-12137" }, { "category": "external", "summary": "SUSE Bug 1051788 for CVE-2017-12137", "url": "https://bugzilla.suse.com/1051788" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-12137", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-12137" }, { "cve": "CVE-2017-2615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2615" } ], "notes": [ { "category": "general", "text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2615", "url": "https://www.suse.com/security/cve/CVE-2017-2615" }, { "category": "external", "summary": "SUSE Bug 1023004 for CVE-2017-2615", "url": "https://bugzilla.suse.com/1023004" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-2615", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2615" }, { "cve": "CVE-2017-2620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2620" } ], "notes": [ { "category": "general", "text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2620", "url": "https://www.suse.com/security/cve/CVE-2017-2620" }, { "category": "external", "summary": "SUSE Bug 1024834 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1024834" }, { "category": "external", "summary": "SUSE Bug 1024972 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1024972" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-2620", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-2620" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-6505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6505" } ], "notes": [ { "category": "general", "text": "The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6505", "url": "https://www.suse.com/security/cve/CVE-2017-6505" }, { "category": "external", "summary": "SUSE Bug 1028184 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1028184" }, { "category": "external", "summary": "SUSE Bug 1028235 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1028235" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-6505", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-6505" }, { "cve": "CVE-2017-8309", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8309" } ], "notes": [ { "category": "general", "text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8309", "url": "https://www.suse.com/security/cve/CVE-2017-8309" }, { "category": "external", "summary": "SUSE Bug 1037242 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1037242" }, { "category": "external", "summary": "SUSE Bug 1037243 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1037243" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-8309", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-8309" }, { "cve": "CVE-2017-9330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9330" } ], "notes": [ { "category": "general", "text": "QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9330", "url": "https://www.suse.com/security/cve/CVE-2017-9330" }, { "category": "external", "summary": "SUSE Bug 1042159 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1042159" }, { "category": "external", "summary": "SUSE Bug 1042160 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1042160" }, { "category": "external", "summary": "SUSE Bug 1043157 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1043157" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-9330", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-9330" }, { "cve": "CVE-2018-10471", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10471" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10471", "url": "https://www.suse.com/security/cve/CVE-2018-10471" }, { "category": "external", "summary": "SUSE Bug 1089635 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1089635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10471", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10471" }, { "cve": "CVE-2018-10472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10472" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10472", "url": "https://www.suse.com/security/cve/CVE-2018-10472" }, { "category": "external", "summary": "SUSE Bug 1089152 for CVE-2018-10472", "url": "https://bugzilla.suse.com/1089152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10472" }, { "cve": "CVE-2018-10981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10981" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10981", "url": "https://www.suse.com/security/cve/CVE-2018-10981" }, { "category": "external", "summary": "SUSE Bug 1090823 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1090823" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10981", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10981" }, { "cve": "CVE-2018-10982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10982" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10982", "url": "https://www.suse.com/security/cve/CVE-2018-10982" }, { "category": "external", "summary": "SUSE Bug 1090822 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1090822" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-10982", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-10982" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12891", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12891" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12891", "url": "https://www.suse.com/security/cve/CVE-2018-12891" }, { "category": "external", "summary": "SUSE Bug 1097521 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1097521" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12891", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12891" }, { "cve": "CVE-2018-12892", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12892" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as \"sd\" in the libxl disk configuration, or an equivalent) are affected. IDE disks (\"hd\") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12892", "url": "https://www.suse.com/security/cve/CVE-2018-12892" }, { "category": "external", "summary": "SUSE Bug 1097523 for CVE-2018-12892", "url": "https://bugzilla.suse.com/1097523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12892" }, { "cve": "CVE-2018-12893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12893" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12893", "url": "https://www.suse.com/security/cve/CVE-2018-12893" }, { "category": "external", "summary": "SUSE Bug 1097522 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1097522" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12893", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12893" }, { "cve": "CVE-2018-15468", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15468" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15468", "url": "https://www.suse.com/security/cve/CVE-2018-15468" }, { "category": "external", "summary": "SUSE Bug 1103276 for CVE-2018-15468", "url": "https://bugzilla.suse.com/1103276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15468" }, { "cve": "CVE-2018-15469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15469" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15469", "url": "https://www.suse.com/security/cve/CVE-2018-15469" }, { "category": "external", "summary": "SUSE Bug 1103275 for CVE-2018-15469", "url": "https://bugzilla.suse.com/1103275" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15469" }, { "cve": "CVE-2018-15470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15470" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 \"Operations on data structures\" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15470", "url": "https://www.suse.com/security/cve/CVE-2018-15470" }, { "category": "external", "summary": "SUSE Bug 1103279 for CVE-2018-15470", "url": "https://bugzilla.suse.com/1103279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-15470" }, { "cve": "CVE-2018-18883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18883" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18883", "url": "https://www.suse.com/security/cve/CVE-2018-18883" }, { "category": "external", "summary": "SUSE Bug 1114405 for CVE-2018-18883", "url": "https://bugzilla.suse.com/1114405" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18883" }, { "cve": "CVE-2018-19961", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19961" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19961", "url": "https://www.suse.com/security/cve/CVE-2018-19961" }, { "category": "external", "summary": "SUSE Bug 1115040 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1115040" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19961", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19961" }, { "cve": "CVE-2018-19963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19963" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19963", "url": "https://www.suse.com/security/cve/CVE-2018-19963" }, { "category": "external", "summary": "SUSE Bug 1115043 for CVE-2018-19963", "url": "https://bugzilla.suse.com/1115043" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-19963" }, { "cve": "CVE-2018-19964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19964" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19964", "url": "https://www.suse.com/security/cve/CVE-2018-19964" }, { "category": "external", "summary": "SUSE Bug 1115044 for CVE-2018-19964", "url": "https://bugzilla.suse.com/1115044" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19964" }, { "cve": "CVE-2018-19965", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19965" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19965", "url": "https://www.suse.com/security/cve/CVE-2018-19965" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2018-19965", "url": "https://bugzilla.suse.com/1115045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19965" }, { "cve": "CVE-2018-19966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19966" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19966", "url": "https://www.suse.com/security/cve/CVE-2018-19966" }, { "category": "external", "summary": "SUSE Bug 1115047 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1115047" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19966", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19966" }, { "cve": "CVE-2018-19967", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19967" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel\u0027s mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19967", "url": "https://www.suse.com/security/cve/CVE-2018-19967" }, { "category": "external", "summary": "SUSE Bug 1114988 for CVE-2018-19967", "url": "https://bugzilla.suse.com/1114988" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-19967", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19967" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5244" } ], "notes": [ { "category": "general", "text": "In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn\u0027t freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5244", "url": "https://www.suse.com/security/cve/CVE-2018-5244" }, { "category": "external", "summary": "SUSE Bug 1073961 for CVE-2018-5244", "url": "https://bugzilla.suse.com/1073961" }, { "category": "external", "summary": "SUSE Bug 1074966 for CVE-2018-5244", "url": "https://bugzilla.suse.com/1074966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5244" }, { "cve": "CVE-2018-7540", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7540" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7540", "url": "https://www.suse.com/security/cve/CVE-2018-7540" }, { "category": "external", "summary": "SUSE Bug 1080635 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1080635" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7540", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-7540" }, { "cve": "CVE-2018-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7541" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7541", "url": "https://www.suse.com/security/cve/CVE-2018-7541" }, { "category": "external", "summary": "SUSE Bug 1080662 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1080662" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-7541", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7541" }, { "cve": "CVE-2018-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7542" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7542", "url": "https://www.suse.com/security/cve/CVE-2018-7542" }, { "category": "external", "summary": "SUSE Bug 1080634 for CVE-2018-7542", "url": "https://bugzilla.suse.com/1080634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-7542" }, { "cve": "CVE-2018-8897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8897" } ], "notes": [ { "category": "general", "text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8897", "url": "https://www.suse.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087088 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1087088" }, { "category": "external", "summary": "SUSE Bug 1090368 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090368" }, { "category": "external", "summary": "SUSE Bug 1090820 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090820" }, { "category": "external", "summary": "SUSE Bug 1090869 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1090869" }, { "category": "external", "summary": "SUSE Bug 1092497 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1092497" }, { "category": "external", "summary": "SUSE Bug 1093522 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093522" }, { "category": "external", "summary": "SUSE Bug 1093524 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1093524" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100835 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1100835" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-8897", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-8897" }, { "cve": "CVE-2019-17349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17349" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17349", "url": "https://www.suse.com/security/cve/CVE-2019-17349" }, { "category": "external", "summary": "SUSE Bug 1138294 for CVE-2019-17349", "url": "https://bugzilla.suse.com/1138294" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17349" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-11739", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11739" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don\u0027t contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11739", "url": "https://www.suse.com/security/cve/CVE-2020-11739" }, { "category": "external", "summary": "SUSE Bug 1168142 for CVE-2020-11739", "url": "https://bugzilla.suse.com/1168142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-11739" }, { "cve": "CVE-2020-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11740" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11740", "url": "https://www.suse.com/security/cve/CVE-2020-11740" }, { "category": "external", "summary": "SUSE Bug 1168140 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1168140" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11740", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-11740" }, { "cve": "CVE-2020-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11742" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11742", "url": "https://www.suse.com/security/cve/CVE-2020-11742" }, { "category": "external", "summary": "SUSE Bug 1169392 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1169392" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-11742", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11742" }, { "cve": "CVE-2020-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11743" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11743", "url": "https://www.suse.com/security/cve/CVE-2020-11743" }, { "category": "external", "summary": "SUSE Bug 1168143 for CVE-2020-11743", "url": "https://bugzilla.suse.com/1168143" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-11743" }, { "cve": "CVE-2020-15563", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15563" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15563", "url": "https://www.suse.com/security/cve/CVE-2020-15563" }, { "category": "external", "summary": "SUSE Bug 1173377 for CVE-2020-15563", "url": "https://bugzilla.suse.com/1173377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15563" }, { "cve": "CVE-2020-15565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15565" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15565", "url": "https://www.suse.com/security/cve/CVE-2020-15565" }, { "category": "external", "summary": "SUSE Bug 1173378 for CVE-2020-15565", "url": "https://bugzilla.suse.com/1173378" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-15565" }, { "cve": "CVE-2020-15566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15566", "url": "https://www.suse.com/security/cve/CVE-2020-15566" }, { "category": "external", "summary": "SUSE Bug 1173376 for CVE-2020-15566", "url": "https://bugzilla.suse.com/1173376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15566" }, { "cve": "CVE-2020-15567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15567", "url": "https://www.suse.com/security/cve/CVE-2020-15567" }, { "category": "external", "summary": "SUSE Bug 1173380 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1173380" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-15567", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-15567" }, { "cve": "CVE-2020-25595", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25595" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen\u0027s MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn\u0027t be able to affect these registers, experience shows that it\u0027s very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it\u0027s better to assume that it does.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25595", "url": "https://www.suse.com/security/cve/CVE-2020-25595" }, { "category": "external", "summary": "SUSE Bug 1176344 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1176344" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25595", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25595" }, { "cve": "CVE-2020-25596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25596" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen\u0027s sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25596", "url": "https://www.suse.com/security/cve/CVE-2020-25596" }, { "category": "external", "summary": "SUSE Bug 1176345 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1176345" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25596", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25596" }, { "cve": "CVE-2020-25597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25597" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25597", "url": "https://www.suse.com/security/cve/CVE-2020-25597" }, { "category": "external", "summary": "SUSE Bug 1176346 for CVE-2020-25597", "url": "https://bugzilla.suse.com/1176346" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25597" }, { "cve": "CVE-2020-25598", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25598" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don\u0027t use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25598", "url": "https://www.suse.com/security/cve/CVE-2020-25598" }, { "category": "external", "summary": "SUSE Bug 1176341 for CVE-2020-25598", "url": "https://bugzilla.suse.com/1176341" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25598" }, { "cve": "CVE-2020-25599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25599" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25599", "url": "https://www.suse.com/security/cve/CVE-2020-25599" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-25599", "url": "https://bugzilla.suse.com/1176349" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25599" }, { "cve": "CVE-2020-25600", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25600" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn\u0027t get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25600", "url": "https://www.suse.com/security/cve/CVE-2020-25600" }, { "category": "external", "summary": "SUSE Bug 1176348 for CVE-2020-25600", "url": "https://bugzilla.suse.com/1176348" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25600" }, { "cve": "CVE-2020-25601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25601" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25601", "url": "https://www.suse.com/security/cve/CVE-2020-25601" }, { "category": "external", "summary": "SUSE Bug 1176350 for CVE-2020-25601", "url": "https://bugzilla.suse.com/1176350" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25601" }, { "cve": "CVE-2020-25602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25602" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25602", "url": "https://www.suse.com/security/cve/CVE-2020-25602" }, { "category": "external", "summary": "SUSE Bug 1176339 for CVE-2020-25602", "url": "https://bugzilla.suse.com/1176339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25602" }, { "cve": "CVE-2020-25603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25603" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25603", "url": "https://www.suse.com/security/cve/CVE-2020-25603" }, { "category": "external", "summary": "SUSE Bug 1176347 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1176347" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25603", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25603" }, { "cve": "CVE-2020-25604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25604" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn\u0027t acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25604", "url": "https://www.suse.com/security/cve/CVE-2020-25604" }, { "category": "external", "summary": "SUSE Bug 1176343 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1176343" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-25604", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25604" }, { "cve": "CVE-2020-27670", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27670" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27670", "url": "https://www.suse.com/security/cve/CVE-2020-27670" }, { "category": "external", "summary": "SUSE Bug 1177414 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1177414" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27670", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27670" }, { "cve": "CVE-2020-27671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27671" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27671", "url": "https://www.suse.com/security/cve/CVE-2020-27671" }, { "category": "external", "summary": "SUSE Bug 1177413 for CVE-2020-27671", "url": "https://bugzilla.suse.com/1177413" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27671", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27671" }, { "cve": "CVE-2020-27672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27672" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27672", "url": "https://www.suse.com/security/cve/CVE-2020-27672" }, { "category": "external", "summary": "SUSE Bug 1177412 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1177412" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1183925 for CVE-2020-27672", "url": "https://bugzilla.suse.com/1183925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-27672" }, { "cve": "CVE-2020-27674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27674", "url": "https://www.suse.com/security/cve/CVE-2020-27674" }, { "category": "external", "summary": "SUSE Bug 1177409 for CVE-2020-27674", "url": "https://bugzilla.suse.com/1177409" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-27674", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-27674" }, { "cve": "CVE-2020-28368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28368" } ], "notes": [ { "category": "general", "text": "Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a \"Platypus\" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28368", "url": "https://www.suse.com/security/cve/CVE-2020-28368" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-28368", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-28368", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-28368" }, { "cve": "CVE-2020-29040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29040" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM guest OS users to cause a denial of service (stack corruption), cause a data leak, or possibly gain privileges because of an off-by-one error. NOTE: this issue is caused by an incorrect fix for CVE-2020-27671.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29040", "url": "https://www.suse.com/security/cve/CVE-2020-29040" }, { "category": "external", "summary": "SUSE Bug 1178963 for CVE-2020-29040", "url": "https://bugzilla.suse.com/1178963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29040" }, { "cve": "CVE-2020-29480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29480" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests\u0027 devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29480", "url": "https://www.suse.com/security/cve/CVE-2020-29480" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29480", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179496 for CVE-2020-29480", "url": "https://bugzilla.suse.com/1179496" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2020-29480" }, { "cve": "CVE-2020-29481", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29481" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/\u003cdomid\u003e are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29481", "url": "https://www.suse.com/security/cve/CVE-2020-29481" }, { "category": "external", "summary": "SUSE Bug 1176349 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1176349" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179498 for CVE-2020-29481", "url": "https://bugzilla.suse.com/1179498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29481" }, { "cve": "CVE-2020-29483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29483" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored\u0027s internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest\u0027s memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29483", "url": "https://www.suse.com/security/cve/CVE-2020-29483" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29483", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179502 for CVE-2020-29483", "url": "https://bugzilla.suse.com/1179502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29483" }, { "cve": "CVE-2020-29484", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29484" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29484", "url": "https://www.suse.com/security/cve/CVE-2020-29484" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29484", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179501 for CVE-2020-29484", "url": "https://bugzilla.suse.com/1179501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29484" }, { "cve": "CVE-2020-29566", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29566" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29566", "url": "https://www.suse.com/security/cve/CVE-2020-29566" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-29566", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1179506 for CVE-2020-29566", "url": "https://bugzilla.suse.com/1179506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29566" }, { "cve": "CVE-2020-29567", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29567" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29567", "url": "https://www.suse.com/security/cve/CVE-2020-29567" }, { "category": "external", "summary": "SUSE Bug 1179513 for CVE-2020-29567", "url": "https://bugzilla.suse.com/1179513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29567" }, { "cve": "CVE-2020-29570", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29570" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29570", "url": "https://www.suse.com/security/cve/CVE-2020-29570" }, { "category": "external", "summary": "SUSE Bug 1179514 for CVE-2020-29570", "url": "https://bugzilla.suse.com/1179514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29570" }, { "cve": "CVE-2020-29571", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29571" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn\u0027t protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29571", "url": "https://www.suse.com/security/cve/CVE-2020-29571" }, { "category": "external", "summary": "SUSE Bug 1179516 for CVE-2020-29571", "url": "https://bugzilla.suse.com/1179516" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-29571" }, { "cve": "CVE-2021-28687", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28687" } ], "notes": [ { "category": "general", "text": "HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the \"soft reset\" feature was implemented, the libxl__domain_suspend_state structure didn\u0027t require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the \"soft reset\" path wasn\u0027t refactored to call the initialization function. When a guest nwo initiates a \"soft reboot\", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes \"leak\" resources, then repeated crashes could use up resources, also causing a system-wide DoS.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28687", "url": "https://www.suse.com/security/cve/CVE-2021-28687" }, { "category": "external", "summary": "SUSE Bug 1183072 for CVE-2021-28687", "url": "https://bugzilla.suse.com/1183072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x", "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28687" } ] }
gsd-2018-8897
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-8897", "description": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "id": "GSD-2018-8897", "references": [ "https://www.suse.com/security/cve/CVE-2018-8897.html", "https://www.debian.org/security/2018/dsa-4201", "https://www.debian.org/security/2018/dsa-4196", "https://access.redhat.com/errata/RHSA-2018:1711", "https://access.redhat.com/errata/RHSA-2018:1710", "https://access.redhat.com/errata/RHSA-2018:1524", "https://access.redhat.com/errata/RHSA-2018:1355", "https://access.redhat.com/errata/RHSA-2018:1354", "https://access.redhat.com/errata/RHSA-2018:1353", "https://access.redhat.com/errata/RHSA-2018:1352", "https://access.redhat.com/errata/RHSA-2018:1351", "https://access.redhat.com/errata/RHSA-2018:1350", "https://access.redhat.com/errata/RHSA-2018:1349", "https://access.redhat.com/errata/RHSA-2018:1348", "https://access.redhat.com/errata/RHSA-2018:1347", "https://access.redhat.com/errata/RHSA-2018:1346", "https://access.redhat.com/errata/RHSA-2018:1345", "https://access.redhat.com/errata/RHSA-2018:1319", "https://access.redhat.com/errata/RHSA-2018:1318", "https://ubuntu.com/security/CVE-2018-8897", "https://advisories.mageia.org/CVE-2018-8897.html", "https://security.archlinux.org/CVE-2018-8897", "https://alas.aws.amazon.com/cve/html/CVE-2018-8897.html", "https://linux.oracle.com/cve/CVE-2018-8897.html", "https://packetstormsecurity.com/files/cve/CVE-2018-8897" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-8897" ], "details": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.", "id": "GSD-2018-8897", "modified": "2023-12-13T01:22:34.659967Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "name": "http://openwall.com/lists/oss-security/2018/05/08/4", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "name": "1040849", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040849" }, { "name": "104071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104071" }, { "name": "RHSA-2018:1350", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "name": "https://support.citrix.com/article/CTX234679", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX234679" }, { "name": "RHSA-2018:1347", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "44697", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44697/" }, { "name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "name": "1040866", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040866" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "name": "https://support.apple.com/HT208742", "refsource": "MISC", "url": "https://support.apple.com/HT208742" }, { "name": "RHSA-2018:1346", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "name": "RHSA-2018:1348", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "RHSA-2018:1354", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "name": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368", "refsource": "MISC", "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "name": "DSA-4196", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc", "refsource": "MISC", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "name": "1040744", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040744" }, { "name": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html", "refsource": "MISC", "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "name": "RHSA-2018:1351", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "name": "https://xenbits.xen.org/xsa/advisory-260.html", "refsource": "MISC", "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "name": "RHSA-2018:1319", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "DSA-4201", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4201" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "RHSA-2018:1355", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "https://security.netapp.com/advisory/ntap-20180927-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "name": "RHSA-2018:1345", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "45024", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45024/" }, { "name": "RHSA-2018:1349", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "name": "RHSA-2018:1352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "name": "RHSA-2018:1318", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "name": "https://patchwork.kernel.org/patch/10386677/", "refsource": "MISC", "url": "https://patchwork.kernel.org/patch/10386677/" }, { "name": "VU#631579", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/631579" }, { "name": "https://github.com/can1357/CVE-2018-8897/", "refsource": "MISC", "url": "https://github.com/can1357/CVE-2018-8897/" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "http://openwall.com/lists/oss-security/2018/05/08/1", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "name": "1040861", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040861" }, { "name": "RHSA-2018:1353", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "name": "USN-3641-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_21", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "name": "1040882", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040882" }, { "name": "USN-3641-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3641-1/" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.13.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1", "versionStartIncluding": "11.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8897" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "https://xenbits.xen.org/xsa/advisory-260.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://xenbits.xen.org/xsa/advisory-260.html" }, { "name": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc" }, { "name": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "name": "http://openwall.com/lists/oss-security/2018/05/08/1", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/1" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9" }, { "name": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=333368" }, { "name": "https://support.apple.com/HT208742", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT208742" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897" }, { "name": "http://openwall.com/lists/oss-security/2018/05/08/4", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2018/05/08/4" }, { "name": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_21", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_21" }, { "name": "USN-3641-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-2/" }, { "name": "https://support.citrix.com/article/CTX234679", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX234679" }, { "name": "https://patchwork.kernel.org/patch/10386677/", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://patchwork.kernel.org/patch/10386677/" }, { "name": "RHSA-2018:1355", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "name": "RHSA-2018:1354", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1354" }, { "name": "RHSA-2018:1353", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1353" }, { "name": "RHSA-2018:1352", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1352" }, { "name": "RHSA-2018:1351", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "name": "RHSA-2018:1350", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "name": "RHSA-2018:1349", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "name": "RHSA-2018:1348", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1348" }, { "name": "RHSA-2018:1347", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1347" }, { "name": "RHSA-2018:1346", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "name": "RHSA-2018:1345", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1345" }, { "name": "RHSA-2018:1319", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "RHSA-2018:1318", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "name": "1040849", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040849" }, { "name": "104071", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104071" }, { "name": "DSA-4196", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4196" }, { "name": "1040882", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040882" }, { "name": "1040866", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040866" }, { "name": "1040861", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040861" }, { "name": "1040744", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040744" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "DSA-4201", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "name": "https://github.com/can1357/CVE-2018-8897/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/can1357/CVE-2018-8897/" }, { "name": "44697", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44697/" }, { "name": "[debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "name": "USN-3641-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3641-1/" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "name": "45024", "refsource": "EXPLOIT-DB", "tags": [], "url": "https://www.exploit-db.com/exploits/45024/" }, { "name": "https://security.netapp.com/advisory/ntap-20180927-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20180927-0002/" }, { "name": "[debian-lts-announce] 20181112 [SECURITY] [DLA 1577-1] xen security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "tags": [], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "VU#631579", "refsource": "CERT-VN", "tags": [], "url": "https://www.kb.cert.org/vuls/id/631579" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en", "refsource": "CONFIRM", "tags": [], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-03T00:03Z", "publishedDate": "2018-05-08T18:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.